Course Overview

The Managing HPE Alletra 9000 course describes the HPE Alletra 9000 portfolio hardware building blocks, theory of operation and features. Using hands-on labs (HOL), students learn to perform common day-to-day management tasks, including how to create hosts, volumes, and sets, as well as how to monitor the product. This course also provides knowledge of more advanced features, including local and remote replication, disaster recovery, QoS, as well as maintenance and data migration. You gain a practical understanding of HPE Alletra 9000 array capabilities using extensive hands-on lab exercises, performed on all applicable user interfaces.

Course Objectives

Course objectives

After completing this course, you should be

able to:

• Describe HPE Alletra 9000 hardware and

features

• List and compare HPE Alletra 9000

management options, roles, and security

• Explain provisioning terminology

• Perform HPE Alletra 9000 array on-boarding

and initialization

• Work with volumes, hosts, and corresponding

sets

• Protect data with snapshots, clones, and use

protection policies

• Describe priority optimization and quality of

service (QoS)

• Explain different types of Remote Copy

implementations and failure scenarios

• Briefly describe data migration, high

availability, and disaster tolerance solutions

• Describe HPE Alletra monitoring and alerting

options including HPE InfoSight

• Describe the HPE Alletra 9000 OS update

procedure, maintenance, and data migration

options

Course Content

Managing HPE Alletra 9000 | H61N3S

Course Overview

The Managing HPE Alletra 6000 and HPE Alletra 5000 course describes the HPE Alletra 6000 and HPE Alletra 5000 portfolio hardware building blocks, theories of operation, and features. Using hands-on labs, students learn to perform common day-to-day management tasks, including how to create hosts, volumes, and collections, as well as how to monitor the product. This course also provides knowledge of more advanced features, including local and remote replication, disaster recovery, scaling-out, QoS, and maintenance. You gain a practical understanding of HPE Alletra 6000 and HPE Alletra 5000 array capabilities using extensive hands-on lab exercises, performed on all applicable user interfaces

Course Objectives

After completing this course, you should be

able to:

• Describe HPE Alletra 6000 and HPE

Alletra 5000 hardware, architecture, and

software features

• List and compare HPE Alletra 6000 and

HPE Alletra 5000 management options

• Describe HPE Alletra 6000 and HPE

Alletra 5000 array initialization and Data

Services Cloud Console onboarding

• Explain HPE Alletra 6000 and HPE Alletra

5000 provisioning terminology, features, and

read/write operations flow

• Prepare and create hosts and initiator groups

for HPE Alletra 6000 and HPE Alletra 5000

storage arrays

• Work with volumes, volume collections, and

quality of service (QoS)

• Describe and manage snapshots, clones, and

protection templates

• Describe the concept, use, and benefits of

the HPE Alletra 6000 and HPE Alletra 5000

storage scale-out architectures

• Explain asynchronous remote replication

concepts, implementation, and failure

scenarios

• Describe peer persistence concepts,

architecture, requirements, and the automatic

switchover (ASO) process

• Describe HPE Alletra 6000 and HPE Alletra

5000 monitoring options and tools

• Describe the HPE Alletra 6000 and HPE

Alletra 5000 OS update procedure

Course Content

Managing HPE Alletra 6000 and HPE Alletra 5000 | H61N2S

Course Overview

LPIC-2 is the second certification in the multi-level professional certification program of the Linux Professional Institute (LPI). The LPIC-2 will validate the candidate’s ability to administer small to medium–sized mixed networks. LPIC-2 exam 202 topics

  • Domain Name Server
  • Web Services
  • File Sharing
  • Network Client Management
  • E-Mail Services
  • System Security

Course Objectives

To become LPIC-2 certified the candidate must be able to:

  • perform advanced system administration, including common tasks regarding the Linux kernel, system startup and maintenance;
  • perform advanced Management of block storage and file systems as well as advanced networking and authentication and system security, including firewall and VPN;
  • install and configure fundamental network services, including DHCP, DNS,  SSH, Web servers, file servers using FTP, NFS and Samba, email delivery; and
  • supervise assistants and advise management on automation and purchases.

Course Content

Topic 207: Domain Name Server 207.1 Basic DNS server configuration

Description: Candidates should be able to configure BIND to function as a caching-only DNS server. This objective includes the ability to manage a running server and configuring logging.

Key Knowledge Areas:

  • BIND 9.x configuration files, terms and utilities
  • Defining the location of the BIND zone files in BIND configuration files
  • Reloading modified configuration and zone files
  • Awareness of dnsmasq, djbdns and PowerDNS as alternate name servers 

207.2 Create and maintain DNS zones

Description: Candidates should be able to create a zone file for a forward or reverse zone and hints for root level servers. This objective includes setting appropriate values for records, adding hosts in zones and adding zones to the DNS. A candidate should also be able to delegate zones to another DNS server.

Key Knowledge Areas:

  • BIND 9 configuration files, terms and utilities
  • Utilities to request information from the DNS server
  • Layout, content and file location of the BIND zone files
  • Various methods to add a new host in the zone files, including reverse zones

207.3 Securing a DNS server

Description: Candidates should be able to configure a DNS server to run as a non-root user and run in a chroot jail. This objective includes secure exchange of data between DNS servers.

Key Knowledge Areas:

  • BIND 9 configuration files
  • Configuring BIND to run in a chroot jail
  • Split configuration of BIND using the forwarders statement
  • Configuring and using transaction signatures (TSIG)
  • Awareness of DNSSEC and basic tools
  • Awareness of DANE and related records

Topic 208: Web Services 208.1 Implementing a web server

Description: Candidates should be able to install and configure a web server. This objective includes monitoring the server’s load and performance, restricting client user access, configuring support for scripting languages as modules and setting up client user authentication. Also included is configuring server options to restrict usage of resources. Candidates should be able to configure a web server to use virtual hosts and customize file access.

Key Knowledge Areas:

  • Apache 2.4 configuration files, terms and utilities
  • Apache log files configuration and content
  • Access restriction methods and files
  • mod_perl and PHP configuration
  • Client user authentication files and utilities
  • Configuration of maximum requests, minimum and maximum servers and clients
  • Apache 2.4 virtual host implementation (with and without dedicated IP addresses)
  • Using redirect statements in Apache’s configuration files to customize file access

208.2 Apache configuration for HTTPS 

Description: Candidates should be able to configure a web server to provide HTTPS.

Key Knowledge Areas:

  • SSL configuration files, tools and utilities
  • Generate a server private key and CSR for a commercial CA
  • Generate a self-signed Certificate
  • Install the key and certificate, including intermediate CAs
  • Configure Virtual Hosting using SNI
  • Awareness of the issues with Virtual Hosting and use of SSL
  • Security issues in SSL use, disable insecure protocols and ciphers

208.3 Implementing a proxy server

Description: Candidates should be able to install and configure a proxy server, including access policies, authentication and resource usage.

Key Knowledge Areas:

  • Squid 3.x configuration files, terms and utilities
  • Access restriction methods
  • Client user authentication methods
  • Layout and content of ACL in the Squid configuration files

208.4 Implementing Nginx as a web server and a reverse proxy

Description: Candidates should be able to install and configure a reverse proxy server, Nginx. Basic configuration of Nginx as a HTTP server is included.

Key Knowledge Areas:

  • Nginx
  • Reverse Proxy
  • Basic Web Server

Topic 209: File Sharing 209.1 SAMBA Server Configuration

Description: Candidates should be able to set up a Samba server for various clients. This objective includes setting up Samba as a standalone server as well as integrating Samba as a member in an Active Directory. Furthermore, the configuration of simple CIFS and printer shares is covered. Also covered is a configuring a Linux client to use a Samba server. Troubleshooting installations is also tested.

Key Knowledge Areas:

  • Samba 4 documentation
  • Samba 4 configuration files
  • Samba 4 tools and utilities and daemons
  • Mounting CIFS shares on Linux
  • Mapping Windows user names to Linux user names
  • User-Level, Share-Level and AD security

209.2 NFS Server Configuration

Description: Candidates should be able to export filesystems using NFS. This objective includes access restrictions, mounting an NFS filesystem on a client and securing NFS.

Key Knowledge Areas:

  • NFS version 3 configuration files
  • NFS tools and utilities
  • Access restrictions to certain hosts and/or subnets
  • Mount options on server and client
  • TCP Wrappers
  • Awareness of NFSv4

Topic 210: Network Client Management 210.1 DHCP configuration

Description: Candidates should be able to configure a DHCP server. This objective includes setting default and per client options, adding static hosts and BOOTP hosts. Also included is configuring a DHCP relay agent and maintaining the DHCP server.

Key Knowledge Areas:

  • DHCP configuration files, terms and utilities
  • Subnet and dynamically-allocated range setup
  • Awareness of DHCPv6 and IPv6 Router Advertisements

210.2 PAM authentication

Description: The candidate should be able to configure PAM to support authentication using various available methods. This includes basic SSSD functionality.

Key Knowledge Areas:

  • PAM configuration files, terms and utilities
  • passwd and shadow passwords
  • Use sssd for LDAP authentication

210.3 LDAP client usage

Description: Candidates should be able to perform queries and updates to an LDAP server. Also included is importing and adding items, as well as adding and managing users.

Key Knowledge Areas:

  • LDAP utilities for data management and queries
  • Change user passwords
  • Querying the LDAP directory

210.4 Configuring an OpenLDAP server

Description: Candidates should be able to configure a basic OpenLDAP server including knowledge of LDIF format and essential access controls.

Key Knowledge Areas:

  • OpenLDAP
  • Directory based configuration
  • Access Control
  • Distinguished Names
  • Changetype Operations
  • Schemas and Whitepages
  • Directories
  • Object IDs, Attributes and Classes

Terms and Utilities:

  • slapd
  • slapd-config
  • LDIF
  • slapadd
  • slapcat
  • slapindex
  • /var/lib/ldap/
  • loglevel

Topic 211: E-Mail Services 211.1 Using e-mail servers

Description: Candidates should be able to manage an e-mail server, including the configuration of e-mail aliases, e-mail quotas and virtual e-mail domains. This objective includes configuring internal e-mail relays and monitoring e-mail servers.

Key Knowledge Areas:

  • Configuration files for postfix
  • Basic TLS configuration for postfix
  • Basic knowledge of the SMTP protocol
  • Awareness of sendmail and exim

211.2 Managing E-Mail Delivery

Weight: 2

Description: Candidates should be able to implement client e-mail management software to filter, sort and monitor incoming user e-mail.

Key Knowledge Areas:

  • Understanding of Sieve functionality, syntax and operators
  • Use Sieve to filter and sort mail with respect to sender, recipient(s), headers and size
  • Awareness of procmail

Terms and Utilities:

  • Conditions and comparison operators
  • keep, fileinto, redirect, reject, discard, stop
  • Dovecot vacation extension

 211.3 Managing Remote E-Mail Delivery

Description: Candidates should be able to install and configure POP and IMAP daemons.

Key Knowledge Areas:

  • Dovecot IMAP and POP3 configuration and administration
  • Basic TLS configuration for Dovecot
  • Awareness of Courier

Terms and Utilities:

  • /etc/dovecot/
  • dovecot.conf
  • doveconf
  • doveadm

Topic 212: System Security

212.1 Configuring a router

Description: Candidates should be able to configure a system to forward IP packet and perform network address translation (NAT, IP masquerading) and state its significance in protecting a network. This objective includes configuring port redirection, managing filter rules and averting attacks.

Key Knowledge Areas:

  • iptables and ip6tables configuration files, tools and utilities
  • Tools, commands and utilities to manage routing tables.
  • Private address ranges (IPv4) and Unique Local Addresses as well as Link Local Addresses (IPv6)
  • Port redirection and IP forwarding
  • List and write filtering and rules that accept or block IP packets based on source or destination protocol, port and address
  • Save and reload filtering configurations

Terms and Utilities:

  • /proc/sys/net/ipv4/
  • /proc/sys/net/ipv6/
  • /etc/services
  • iptables
  • ip6tables

 212.2 Securing FTP servers

Description: Candidates should be able to configure an FTP server for anonymous downloads and uploads. This objective includes precautions to be taken if anonymous uploads are permitted and configuring user access.

Key Knowledge Areas:

  • Configuration files, tools and utilities for Pure-FTPd and vsftpd
  • Awareness of ProFTPd
  • Understanding of passive vs. active FTP connections

212.3 Secure shell (SSH)

Description: Candidates should be able to configure and secure an SSH daemon. This objective includes managing keys and configuring SSH for users. Candidates should also be able to forward an application protocol over SSH and manage the SSH login.

Key Knowledge Areas:

  • OpenSSH configuration files, tools and utilities
  • Login restrictions for the superuser and the normal users
  • Managing and using server and client keys to login with and without password
  • Usage of multiple connections from multiple hosts to guard against loss of connection to remote host following configuration changes

212.4 Security tasks

Description: Candidates should be able to receive security alerts from various sources, install, configure and run intrusion detection systems and apply security patches and bugfixes.

Key Knowledge Areas:

  • Tools and utilities to scan and test ports on a server
  • Locations and organizations that report security alerts as Bugtraq, CERT or other sources
  • Tools and utilities to implement an intrusion detection system (IDS)
  • Awareness of OpenVAS and Snort

212.5 OpenVPN

Description: Candidates should be able to configure a VPN (Virtual Private Network) and create secure point-to-point or site-to-site connections.

Key Knowledge Areas:

  • OpenVPN

Course Overview

LPIC-2 is the second certification in the multi-level professional certification program of the Linux Professional Institute (LPI). The LPIC-2 will validate the candidate’s ability to administer small to medium–sized mixed networks. 

LPIC-2 exam 201 topicsCapacity PlanningLinux KernelSystem StartupFilesystem and DevicesAdvanced Storage Device AdministrationNetworking ConfigurationSystem Maintenance

Course Objectives

To become LPIC-2 certified the candidate must be able to:

  • perform advanced system administration, including common tasks regarding the Linux kernel, system startup and maintenance;
  • perform advanced Management of block storage and file systems as well as advanced networking and authentication and system security, including firewall and VPN;
  • install and configure fundamental network services, including DHCP, DNS,  SSH, Web servers, file servers using FTP, NFS and Samba, email delivery; and
  • supervise assistants and advise management on automation and purchases.

Course Content

Topic 200: Capacity Planning 200.1 Measure and Troubleshoot Resource Usage

Description: Candidates should be able to measure hardware resource and network bandwidth, identify and troubleshoot resource problems.

Key Knowledge Areas:

  • Measure CPU usage
  • Measure memory usage
  • Measure disk I/O
  • Measure network I/O
  • Measure firewalling and routing throughput
  • Map client bandwidth usage
  • Match / correlate system symptoms with likely problems
  • Estimate throughput and identify bottlenecks in a system including networking

200.2 Predict Future Resource Needs

Description: Candidates should be able to monitor resource usage to predict future resource needs.

Key Knowledge Areas:

  • Use monitoring and measurement tools to monitor IT infrastructure usage.
  • Predict capacity break point of a configuration
  • Observe growth rate of capacity usage
  • Graph the trend of capacity usage
  • Awareness of monitoring solutions such as Icinga2, Nagios, collectd, MRTG and Cacti

Topic 201: Linux Kernel 201.1 Kernel Components

Description: Candidates should be able to utilize kernel components that are necessary to specific hardware, hardware drivers, system resources and requirements. This objective includes implementing different types of kernel images, identifying stable and development kernels and patches, as well as using kernel modules.

Key Knowledge Areas:

  • Kernel 2.6.x, 3.x and 4.x documentation

201.2 Compiling a kernel

Description: Candidates should be able to properly configure a kernel to include or disable specific features of the Linux kernel as necessary. This objective includes compiling and recompiling the Linux kernel as needed, updating and noting changes in a new kernel, creating an initrd image and installing new kernels.

Key Knowledge Areas:

  • /usr/src/linux/
  • Kernel Makefiles
  • Kernel 2.6.x/3.x make targets
  • Customize the current kernel configuration.
  • Build a new kernel and appropriate kernel modules.
  • Install a new kernel and any modules.
  • Ensure that the boot manager can locate the new kernel and associated files.
  • Module configuration files
  • Use DKMS to compile kernel modules.
  • Awareness of dracut

201.3 Kernel runtime management and troubleshooting

Description: Candidates should be able to manage and/or query a 2.6.x, 3.x or 4.x kernel and its loadable modules. Candidates should be able to identify and correct common boot and run time issues. Candidates should understand device detection and management using udev. This objective includes troubleshooting udev rules.

Key Knowledge Areas:

  • Use command-line utilities to get information about the currently running kernel and kernel modules
  • Manually load and unload kernel modules
  • Determine when modules can be unloaded
  • Determine what parameters a module accepts
  • Configure the system to load modules by names other than their file name.
  • /proc filesystem
  • Content of /, /boot/ , and /lib/modules/
  • Tools and utilities to analyze information about the available hardware
  • udev rules

Topic 202: System Startup 202.1 Customizing SysV-init system startup

Description: Candidates should be able to query and modify the behaviour of system services at various targets / run levels. A thorough understanding of the systemd, SysV Init and the Linux boot process is required. This objective includes interacting with systemd targets and SysV init run levels.

Key Knowledge Areas:

  • Systemd
  • SysV init
  • Linux Standard Base Specification (LSB)

202.2 System Recovery

Description: Candidates should be able to properly manipulate a Linux system during both the boot process and during recovery mode. This objective includes using both the init utility and init-related kernel options. Candidates should be able to determine the cause of errors in loading and usage of bootloaders. GRUB version 2 and GRUB Legacy are the bootloaders of interest. Both BIOS and UEFI systems are covered.

Key Knowledge Areas:

  • BIOS and UEFI
  • NVMe booting
  • GRUB version 2 and Legacy
  • grub shell
  • boot loader start and hand off to kernel
  • kernel loading
  • hardware initialisation and setup
  • daemon/service initialisation and setup
  • Know the different boot loader install locations on a hard disk or removable device.
  • Overwrite standard boot loader options and using boot loader shells.
  • Use systemd rescue and emergency modes.

202.3 Alternate Bootloaders

Description: Candidates should be aware of other bootloaders and their major features.

Key Knowledge Areas:

  • SYSLINUX, ISOLINUX, PXELINUX
  • Understanding of PXE for both BIOS and UEFI
  • Awareness of systemd-boot and U-Boot

Topic 203: Filesystem and Devices

203.1 Operating the Linux filesystem

Description: Candidates should be able to properly configure and navigate the standard Linux filesystem. This objective includes configuring and mounting various filesystem types.

Key Knowledge Areas:

  • The concept of the fstab configuration
  • Tools and utilities for handling swap partitions and files
  • Use of UUIDs for identifying and mounting file systems
  • Understanding of systemd mount units

203.2 Maintaining a Linux filesystem​

Description: Candidates should be able to properly maintain a Linux filesystem using system utilities. This objective includes manipulating standard filesystems and monitoring SMART devices.

Key Knowledge Areas:

  • Tools and utilities to manipulate and ext2, ext3 and ext4
  • Tools and utilities to perform basic Btrfs operations, including subvolumes and snapshots
  • Tools and utilities to manipulate XFS
  • Awareness of ZFS

203.3 Creating and configuring filesystem options

Description: Candidates should be able to configure automount filesystems using AutoFS. This objective includes configuring automount for network and device filesystems. Also included is creating filesystems for devices such as CD-ROMs and a basic feature knowledge of encrypted filesystems.

Key Knowledge Areas:

  • autofs configuration files
  • Understanding of automount units
  • UDF and ISO9660 tools and utilities
  • Awareness of other CD-ROM filesystems (HFS)
  • Awareness of CD-ROM filesystem extensions (Joliet, Rock Ridge, El Torito)
  • Basic feature knowledge of data encryption (dm-crypt / LUKS)

Topic 204: Advanced Storage Device Administration 204.1 Configuring RAID

Description: Candidates should be able to configure and implement software RAID. This objective includes using and configuring RAID 0, 1 and 5.

Key Knowledge Areas:

  • Software raid configuration files and utilities

204.2 Adjusting Storage Device Access

Description: Candidates should be able to configure kernel options to support various drives. This objective includes software tools to view & modify hard disk settings including iSCSI devices.

Key Knowledge Areas:

  • Tools and utilities to configure DMA for IDE devices including ATAPI and SATA
  • Tools and utilities to configure Solid State Drives including AHCI and NVMe
  • Tools and utilities to manipulate or analyse system resources (e.g. interrupts)
  • Awareness of sdparm command and its uses
  • Tools and utilities for iSCSI
  • Awareness of SAN, including relevant protocols (AoE, FCoE)

204.3 Logical Volume Manager

Description: Candidates should be able to create and remove logical volumes, volume groups, and physical volumes. This objective includes snapshots and resizing logical volumes.

Key Knowledge Areas:

  • Tools in the LVM suite
  • Resizing, renaming, creating, and removing logical volumes, volume groups, and physical volumes
  • Creating and maintaining snapshots
  • Activating volume groups

Topic 205: Network Configuration 205.1 Basic networking configuration

Description: Candidates should be able to configure a network device to be able to connect to a local, wired or wireless, and a wide-area network. This objective includes being able to communicate between various subnets within a single network including both IPv4 and IPv6 networks.

Key Knowledge Areas:

  • Utilities to configure and manipulate ethernet network interfaces
  • Configuring basic access to wireless networks

205.2 Advanced Network Configuration and Troubleshooting

Description: Candidates should be able to configure a network device to implement various network authentication schemes. This objective includes configuring a multi-homed network device and resolving communication problems.

Key Knowledge Areas:

  • Utilities to manipulate routing tables
  • Utilities to configure and manipulate ethernet network interfaces
  • Utilities to analyze the status of the network devices
  • Utilities to monitor and analyze the TCP/IP traffic

205.3 Troubleshooting Network Issues

Description: Candidates should be able to identify and correct common network setup issues, to include knowledge of locations for basic configuration files and commands.

Key Knowledge Areas:

  • Location and content of access restriction files
  • Utilities to configure and manipulate ethernet network interfaces
  • Utilities to manage routing tables
  • Utilities to list network states.
  • Utilities to gain information about the network configuration
  • Methods of information about the recognized and used hardware devices
  • System initialization files and their contents (SysV init process)
  • Awareness of NetworkManager and its impact on network configuration

Topic 206: System Maintenance 206.1 Make and install programs from source

Description: Candidates should be able to build and install an executable program from source. This objective includes being able to unpack a file of sources.

Key Knowledge Areas:

  • Unpack source code using common compression and archive utilities
  • Understand basics of invoking make to compile programs
  • Apply parameters to a configure script
  • Know where sources are stored by default

206.2 Backup operations

Description: Candidates should be able to use system tools to back up important system data.

Key Knowledge Areas:

  • Knowledge about directories that have to be include in backups
  • Awareness of network backup solutions such as Amanda, Bacula, Bareos and BackupPC
  • Knowledge of the benefits and drawbacks of tapes, CDR, disk or other backup media
  • Perform partial and manual backups.
  • Verify the integrity of backup files.
  • Partially or fully restore backups.

206.3 Notify users on system-related issues

Description: Candidates should be able to notify the users about current issues related to the system.

Key Knowledge Areas:

  • ​Automate communication with users through logon messages
  • Inform active users of system maintenance

Course Overview

The Linux Professional Institute (LPI) has established itself as the standard for distribution independent Linux certification. LPI offers three levels of certification: LPI 1, LPI 2 and LPI 3. LPI 1 is the base level certification that is looked for by professionals that want to validate their skills on Linux but not to one specific Linux distribution. This course will help candidates preparing for the LPIC 102 exam, which is the second out of 2 LPI exams candidates have to take to obtain the certificate.

Topics:Shells and Shell ScriptingInterfaces and DesktopsAdministrative TasksEssential System ServicesNetworking FundamentalsSecurity

Course Objectives

  • Shells and Shell Scripting
  • Interfaces and Desktops
  • Administrative Tasks
  • Essential System Services
  • Networking Fundamentals
  • Security

To become LPIC-1 certified the candidate must be able to:

  • understand the architecture of a Linux system;
  • install and maintain a Linux workstation, including X11 and setup it up as a network client;
  • work at the Linux command line, including common GNU and Unix commands;
  • handle files and access permissions as well as system security; and
  • perform easy maintenance tasks: help users, add users to a larger system, backup and restore, shutdown and reboot.

Course Content

Topic 105: Shells and Shell Scripting 105.1 Customize and use the shell environment

Description: Candidates should be able to customize shell environments to meet users’ needs. Candidates should be able to modify global and user profiles.

Key Knowledge Areas:

  • Set environment variables (e.g. PATH) at login or when spawning a new shell.
  • Write Bash functions for frequently used sequences of commands.
  • Maintain skeleton directories for new user accounts.
  • Set command search path with the proper directory.

105.2 Customize or write simple scripts

Description: Candidates should be able to customize existing scripts, or write simple new Bash scripts.

Key Knowledge Areas:

  • Use standard sh syntax (loops, tests).
  • Use command substitution.
  • Test return values for success or failure or other information provided by a command.
  • Execute chained commands.
  • Perform conditional mailing to the superuser.
  • Correctly select the script interpreter through the shebang (#!) line.
  • Manage the location, ownership, execution and suid-rights of scripts.

Topic 106: User Interfaces and Desktops 106.1 Install and configure X11

Description: Candidates should be able to install and configure X11.

Key Knowledge Areas:

  • Understanding of the X11 architecture.
  • Basic understanding and knowledge of the X Window configuration file.
  • Overwrite specific aspects of Xorg configuration, such as keyboard layout.
  • Understand the components of desktop environments, such as display managers and window managers.
  • Manage access to the X server and display applications on remote X servers.
  • Awareness of Wayland.

106.2 Graphical Desktops

Description: Candidates should be aware of major Linux desktops. Furthermore, candidates should be aware of protocols used to access remote desktop sessions.

Key Knowledge Areas:

  • Awareness of major desktop environments
  • Awareness of protocols to access remote desktop sessions

106.3 Accessibility

Description: Demonstrate knowledge and awareness of accessibility technologies.

Key Knowledge Areas:

  • Basic knowledge of visual settings and themes.
  • Basic knowledge of assistive technology.

The following is a partial list of the used files, terms and utilities:

  • High Contrast/Large Print Desktop Themes.
  • Screen Reader.
  • Braille Display.
  • Screen Magnifier.
  • On-Screen Keyboard.
  • Sticky/Repeat keys.
  • Slow/Bounce/Toggle keys.
  • Mouse keys.
  • Gestures.
  • Voice recognition.

Topic 107: Administrative Tasks 107.1 Manage user and group accounts and related system files

Description: Candidates should be able to add, remove, suspend and change user accounts.

Key Knowledge Areas:

  • Add, modify and remove users and groups.
  • Manage user/group info in password/group databases.
  • Create and manage special purpose and limited accounts.

107.2 Automate system administration tasks by scheduling jobs

Description: Candidates should be able to use cron and systemd timers to run jobs at regular intervals and to use at to run jobs at a specific time.

Key Knowledge Areas:

  • Manage cron and at jobs.
  • Configure user access to cron and at services.
  • Understand systemd timer units.

107.3 Localisation and internationalisation

Description: Candidates should be able to localize a system in a different language than English. As well, an understanding of why LANG=C is useful when scripting.

Key Knowledge Areas:

  • Configure locale settings and environment variables.
  • Configure timezone settings and environment variables.

Topic 108: Essential System Services 108.1 Maintain system time

Description: Candidates should be able to properly maintain the system time and synchronize the clock via NTP.

Key Knowledge Areas:

  • Set the system date and time.
  • Set the hardware clock to the correct time in UTC.
  • Configure the correct timezone.
  • Basic NTP configuration using ntpd and chrony.
  • Knowledge of using the pool.ntp.org service.
  • Awareness of the ntpq command.

108.2 System logging

Description: Candidates should be able to configure rsyslog. This objective also includes configuring the logging daemon to send log output to a central log server or accept log output as a central log server. Use of the systemd journal subsystem is covered. Also, awareness of syslog and syslog-ng as alternative logging systems is included.

Key Knowledge Areas:

  • Basic configuration of rsyslog.
  • Understanding of standard facilities, priorities and actions.
  • Query the systemd journal.
  • Filter systemd journal data by criteria such as date, service or priority.
  • Configure persistent systemd journal storage and journal size.
  • Delete old systemd journal data.
  • Retrieve systemd journal data from a rescue system or file system copy.
  • Understand interaction of rsyslog with systemd-journald.
  • Configuration of logrotate.
  • Awareness of syslog and syslog-ng.

108.3 Mail Transfer Agent (MTA) basics

Description: Candidates should be aware of the commonly available MTA programs and be able to perform basic forward and alias configuration on a client host. Other configuration files are not covered.

Key Knowledge Areas:

  • Create e-mail aliases.
    Configure e-mail forwarding.
    Knowledge of commonly available MTA programs (postfix, sendmail, exim) (no configuration).

108.4 Manage printers and printing

Description: Candidates should be able to manage print queues and user print jobs using CUPS and the LPD compatibility interface.

Key Knowledge Areas:

  • Basic CUPS configuration (for local and remote printers).
  • Manage user print queues.
  • Troubleshoot general printing problems.
  • Add and remove jobs from configured printer queues.

Topic 109: Networking Fundamentals 109.1 Fundamentals of internet protocols

Description: Candidates should demonstrate a proper understanding of TCP/IP network fundamentals.

Key Knowledge Areas:

  • Demonstrate an understanding of network masks and CIDR notation.
  • Knowledge of the differences between private and public “dotted quad” IP addresses.
  • Knowledge about common TCP and UDP ports and services (20, 21, 22, 23, 25, 53, 80, 110, 123, 139, 143, 161, 162, 389, 443, 465, 514, 636, 993, 995).
  • Knowledge about the differences and major features of UDP, TCP and ICMP.
  • Knowledge of the major differences between IPv4 and IPv6.
  • Knowledge of the basic features of IPv6.

109.2 Persistent network configuration

Description: Candidates should be able to manage the persistent network configuration of a Linux host.

Key Knowledge Areas:

  • Understand basic TCP/IP host configuration.
  • Configure ethernet and wi-fi network using NetworkManager.
  • Awareness of systemd-networkd.

109.3 Basic network troubleshooting

Description: Candidates should be able to troubleshoot networking issues on client hosts.

Key Knowledge Areas:

  • Manually configure network interfaces, including viewing and changing the configuration of network interfaces using iproute2.
  • Manually configure routing, including viewing and changing routing tables and setting the default route using iproute2.
  • Debug problems associated with the network configuration.
  • Awareness of legacy net-tools commands. 

109.4 Configure client side DNS

Description: Candidates should be able to configure DNS on a client host.

Key Knowledge Areas:

  • Query remote DNS servers.
  • Configure local name resolution and use remote DNS servers.
  • Modify the order in which name resolution is done.
  • Debug errors related to name resolution.
  • Awareness of systemd-resolved.

Topic 110: Security 110.1 Perform security administration tasks

Description: Candidates should know how to review system configuration to ensure host security in accordance with local security policies.

Key Knowledge Areas:

  • Audit a system to find files with the suid/sgid bit set.
  • Set or change user passwords and password aging information.
  • Being able to use nmap and netstat to discover open ports on a system.
  • Set up limits on user logins, processes and memory usage.
  • Determine which users have logged in to the system or are currently logged in.
  • Basic sudo configuration and usage.

110.2 Setup host security

Description: Candidates should know how to set up a basic level of host security.

Key Knowledge Areas:

  • Awareness of shadow passwords and how they work.
  • Turn off network services not in use.
  • Understand the role of TCP wrappers.

110.3 Securing data with encryption

Description: The candidate should be able to use public key techniques to secure data and communication.

Key Knowledge Areas:

  • Perform basic OpenSSH 2 client configuration and usage.
  • Understand the role of OpenSSH 2 server host keys.
  • Perform basic GnuPG configuration, usage and revocation.
  • Use GPG to encrypt, decrypt, sign and verify files.
  • Understand SSH port tunnels (including X11 tunnels).

Course Overview

The Linux Professional Institute (LPI) has established itself as the standard for distribution independent Linux certification. LPI offers three levels of certification: LPI 1, LPI 2 and LPI 3. LPI 1 is the base level certification that is looked for by professionals that want to validate their skills on Linux but not to one specific Linux distribution. This course will help candidates preparing for the LPIC 101 exam, which is the first out of 2 LPI exams candidates have to take to obtain the certificate.

 TopicsSystem ArchitectureLinux Installation and Package ManagementGNU and Unix CommandsDevices, Linux Filesystems, Filesystem Hierarchy Standard

Course Objectives

To become LPIC-1 certified the candidate must be able to:

  • understand the architecture of a Linux system;
  • install and maintain a Linux workstation, including X11 and setup it up as a network client;
  • work at the Linux command line, including common GNU and Unix commands;
  • handle files and access permissions as well as system security; and
  • perform easy maintenance tasks: help users, add users to a larger system, backup and restore, shutdown and reboot.

Course Content

Topic 101: System Architecture

101.1 Determine and configure hardware settings

Description: Candidates should be able to determine and configure fundamental system hardware

Key Knowledge Areas:

  • Enable and disable integrated peripherals.
  • Differentiate between the various types of mass storage devices.
  • Determine hardware resources for devices.
  • Tools and utilities to list various hardware information (e.g. lsusb, lspci, etc.).
  • Tools and utilities to manipulate USB devices.
  • Conceptual understanding of sysfs, udev and dbus.

 101.2 Boot the system

Description: Candidates should be able to guide the system through the booting process.

Key Knowledge Areas:

  • Provide common commands to the boot loader and options to the kernel at boot time.
  • Demonstrate knowledge of the boot sequence from BIOS/UEFI to boot completion.
  • Understanding of SysVinit and systemd.
  • Awareness of Upstart.
  • Check boot events in the log files.

101.3 Change runlevels / boot targets and shutdown or reboot system

Description: Candidates should be able to manage the SysVinit runlevel or systemd boot target of the system. This objective includes changing to single user mode, shutdown or rebooting the system. Candidates should be able to alert users before switching runlevels / boot targets and properly terminate processes. This objective also includes setting the default SysVinit runlevel or systemd boot target. It also includes awareness of Upstart as an alternative to SysVinit or systemd.

Key Knowledge Areas:

  • Set the default runlevel or boot target.
  • Change between runlevels / boot targets including single user mode.
  • Shutdown and reboot from the command line.
  • Alert users before switching runlevels / boot targets or other major system events.
  • Properly terminate processes.
  • Awareness of acpid.

Topic 102: Linux Installation and Package Management 102.1 Design hard disk layout

Description: Candidates should be able to design a disk partitioning scheme for a Linux system.

Key Knowledge Areas:

  • Allocate filesystems and swap space to separate partitions or disks.
  • Tailor the design to the intended use of the system.
  • Ensure the /boot partition conforms to the hardware architecture requirements for booting.
  • Knowledge of basic features of LVM.

102.2 Install a boot manager

Description: Candidates should be able to select, install and configure a boot manager.

Key Knowledge Areas:

  • Providing alternative boot locations and backup boot options.
  • Install and configure a boot loader such as GRUB Legacy.
  • Perform basic configuration changes for GRUB 2.
  • Interact with the boot loader.

102.3 Manage shared libraries

Description: Candidates should be able to determine the shared libraries that executable programs depend on and install them when necessary.

Key Knowledge Areas:

  • Identify shared libraries.
  • Identify the typical locations of system libraries.
  • Load shared libraries.

102.4 Use Debian package management

Description: Candidates should be able to perform package management using the Debian package tools.

Key Knowledge Areas:

  • Install, upgrade and uninstall Debian binary packages.
  • Find packages containing specific files or libraries which may or may not be installed.
  • Obtain package information like version, content, dependencies, package integrity and installation status (whether or not the package is installed).
  • Awareness of apt.

102.5 Use RPM and YUM package management

Description: Candidates should be able to perform package management using RPM, YUM and Zypper.

Key Knowledge Areas:

  • Install, re-install, upgrade and remove packages using RPM, YUM and Zypper.
  • Obtain information on RPM packages such as version, status, dependencies, integrity and signatures.
  • Determine what files a package provides, as well as find which package a specific file comes from.
  • Awareness of dnf.

102.6 Linux as a virtualization guest

Description: Candidates should understand the implications of virtualization and cloud computing on a Linux guest system.

Key Knowledge Areas:

  • Understand the general concept of virtual machines and containers.
  • Understand common elements virtual machines in an IaaS cloud, such as computing instances, block storage and networking.
  • Understand unique properties of a Linux system which have to changed when a system is cloned or used as a template.
  • Understand how system images are used to deploy virtual machines, cloud instances and containers.
  • Understand Linux extensions which integrate Linux with a virtualization product.
  • Awareness of cloud-init.

Topic 103: GNU and Unix Commands 103.1 Work on the command line

Description: Candidates should be able to interact with shells and commands using the command line. The objective assumes the Bash shell.

Key Knowledge Areas:

  • Use single shell commands and one line command sequences to perform basic tasks on the command line.
  • Use and modify the shell environment including defining, referencing and exporting environment variables.
  • Use and edit command history.
  • Invoke commands inside and outside the defined path.

103.2 Process text streams using filters

Description: Candidates should be able to apply filters to text streams.

Key Knowledge Areas:

  • Send text files and output streams through text utility filters to modify the output using standard UNIX commands found in the GNU textutils package.

103.3 Perform basic file management

Description: Candidates should be able to use the basic Linux commands to manage files and directories.

Key Knowledge Areas:

  • Copy, move and remove files and directories individually.
  • Copy multiple files and directories recursively.
  • Remove files and directories recursively.
  • Use simple and advanced wildcard specifications in commands.
  • Using find to locate and act on files based on type, size, or time.
  • Usage of tar, cpio and dd.

103.4 Use streams, pipes and redirects

Description: Candidates should be able to redirect streams and connect them in order to efficiently process textual data. Tasks include redirecting standard input, standard output and standard error, piping the output of one command to the input of another command, using the output of one command as arguments to another command and sending output to both stdout and a file.

Key Knowledge Areas:

  • Redirecting standard input, standard output and standard error.
  • Pipe the output of one command to the input of another command.
  • Use the output of one command as arguments to another command.
  • Send output to both stdout and a file.

103.5 Create, monitor and kill processes

Description: Candidates should be able to perform basic process management.

Key Knowledge Areas:

  • Run jobs in the foreground and background.
  • Signal a program to continue running after logout.
  • Monitor active processes.
  • Select and sort processes for display.
  • Send signals to processes.

103.6 Modify process execution priorities

Description: Candidates should should be able to manage process execution priorities.

Key Knowledge Areas:

  • Know the default priority of a job that is created.
  • Run a program with higher or lower priority than the default.
  • Change the priority of a running process.

103.7 Search text files using regular expressions

Description: Candidates should be able to manipulate files and text data using regular expressions. This objective includes creating simple regular expressions containing several notational elements as well as understanding the differences between basic and extended regular expressions. It also includes using regular expression tools to perform searches through a filesystem or file content.

Key Knowledge Areas:

  • Create simple regular expressions containing several notational elements.
  • Understand the differences between basic and extended regular expressions.
  • Understand the concepts of special characters, character classes, quantifiers and anchors.
  • Use regular expression tools to perform searches through a filesystem or file content.
  • Use regular expressions to delete, change and substitute text.

103.8 Basic file editing

Description: Candidates should be able to edit text files using vi. This objective includes vi navigation, vi modes, inserting, editing, deleting, copying and finding text. It also includes awareness of other common editors and setting the default editor.

Key Knowledge Areas:

  • Navigate a document using vi.
  • Understand and use vi modes.
  • Insert, edit, delete, copy and find text in vi.
  • Awareness of Emacs, nano and vim.
  • Configure the standard editor.

Topic 104: Devices, Linux Filesystems, Filesystem Hierarchy Standard 104.1 Create partitions and filesystems

Description: Candidates should be able to configure disk partitions and then create filesystems on media such as hard disks. This includes the handling of swap partitions.

Key Knowledge Areas:

  • Manage MBR and GPT partition tables
  • Use various mkfs commands to create various filesystems such as:
    • ext2/ext3/ext4
    • XFS
    • VFAT
    • exFAT
  • Basic feature knowledge of Btrfs, including multi-device filesystems, compression and subvolumes.

104.2 Maintain the integrity of filesystems

Description: Candidates should be able to maintain a standard filesystem, as well as the extra data associated with a journaling filesystem.

Key Knowledge Areas:

  • Verify the integrity of filesystems.
  • Monitor free space and inodes.
  • Repair simple filesystem problems.

104.3 Control mounting and unmounting of filesystems

Description: Candidates should be able to configure the mounting of a filesystem.

Key Knowledge Areas:

  • Manually mount and unmount filesystems.
  • Configure filesystem mounting on bootup.
  • Configure user mountable removable filesystems.
  • Use of labels and UUIDs for identifying and mounting file systems.
  • Awareness of systemd mount units.

 104.4 Removed

 104.5 Manage file permissions and ownership

Description: Candidates should be able to control file access through the proper use of permissions and ownerships.

Key Knowledge Areas:

  • Manage access permissions on regular and special files as well as directories.
  • Use access modes such as suid, sgid and the sticky bit to maintain security.
  • Know how to change the file creation mask.
  • Use the group field to grant file access to group members.

104.6 Create and change hard and symbolic links

Description: Candidates should be able to create and manage hard and symbolic links to a file.

Key Knowledge Areas:

  • Create links.
  • Identify hard and/or soft links.
  • Copying versus linking files.
  • Use links to support system administration tasks.

104.7 Find system files and place files in the correct location

Description: Candidates should be thoroughly familiar with the Filesystem Hierarchy Standard (FHS), including typical file locations and directory classifications.

Key Knowledge Areas:

  • Understand the correct locations of files under the FHS.
  • Find files and commands on a Linux system.
  • Know the location and purpose of important file and directories as defined in the FHS.

Course Overview

Linux System Security Course Overview

This highly practical instructor led Linux System Security course is aimed at Linux System Administrators who wish to enhance their knowledge of Linux security and increase the security level of their Linux systems.

The course covers detecting and restricting users and applications for Linux and Red Hat based Linux systems. Security compliance,logging and auditing are also covered along with hardening related tasks. The topics taught are relevant for all Linux distributions. The command line is demonstrated and used extensively throughout the course.

This Linux System Security course is based on the Red Hat/CentOS Linux distribution,the delegate will be able to apply the concepts covered on this course to other Linux based distributions.

Exercises and examples are used throughout the course to give practical hands-on experience with the techniques covered.

Course Objectives

This course aims to provide the delegate with the knowledge to be able to query Linux systems for most security related events and harden many aspects of their systems.

The course explains and demonstrates subjects such as the; Linux logging and auditing framework,SELinux,the firewall,certificate authorities,network time,Secure Shell,Pluggable Authentication Modules,Host Intrusion and Detection Systems (HIDS),detecting and removing malware,password cracking,administering Sudo and encrypting files.

Course Content

Linux System Security Training Course

Course Contents – DAY 1

Course Introduction

  • Administration and Course Materials
  • Course Structure and Agenda
  • Delegate and Trainer Introductions

Session 1: INTRODUCTION TO LINUX SECURITY

  • Linux Native Security
  • Areas of Security
  • Common Attack Methods
  • Basic Security Precautions
  • Standards and Compliance
  • Security Technical Implementation Guides (STIGs)
  • Exercise

Session 2: SECURING THE USER ENVIRONMENT

  • Managing User Accounts and Security Options
  • Configuring Account Defaults
  • Default File and Directory Permissions
  • Configuring History Variables
  • Querying and Confining Command Line History
  • Exercise

Session 3: LINUX LOGGING AND AUDITING

  • Security Related Log Files
  • Querying Login Activity
  • Viewing and Configuring the Journal
  • Viewing and Understanding Audit Records
  • Generating Audit Queries
  • Defining Auditing Rules
  • Audit Performance
  • Exercise

Session 4: SELINUX

  • DAC vs MAC
  • SELinux Policy
  • SELinux Contexts
  • SELinux Key Commands
  • Viewing SELinux Decisions
  • SELinux Booleans
  • Permissive and Unconfined Domains
  • Exporting SELinux Configuration
  • Exercise

Linux System Security Training Course

Course Contents – DAY 2

Session 5: SELINUX MODULES

  • SELinux Entities
  • Listing and Administering SELinux Modules
  • Creating Modules With audit2allow
  • Writing and Editing SELinux Modules
  • Type Enforcement and File Context Files
  • Exercise

Session 6: RED HAT FIREWALL

  • Firewalld Overview
  • Firewalld vs IPTables
  • Configuring Firewall ports
  • Creating a Firewall Service
  • Creating and Configuring Firewall Zones
  • Viewing and Creating Rich Rules
  • Fail2ban Installation and Configuration
  • Exercise

Session 7: SECURING SSH

  • SSH Key Algorithms
  • SSH Agents and Server Options
  • Restricting Authentication Methods
  • Viewing and Encrypting the known_hosts File
  • Certificate Based Authentication
  • Verifying Signed Certificates
  • Exercise

Session 8: SECURING APPLICATIONS

  • TCP Wrapper Access Checking
  • TCP Wrapper Extended Syntax
  • Configuring an NTP Server
  • Securing chrony and Authenticating Clients
  • Exercise

Linux System Security Training Course

Course Contents – DAY 3

Session 9: INTRUSION DETECTION AND PREVENTION

  • Detecting Host Intrusions
  • Limitations of AIDE
  • Installing and Configuring AIDE
  • Detecting Filesystem Changes
  • Detecting and Removing Rootkits
  • Rootkit Best Practices
  • Installing and Configuring ClamAV
  • Exercise

Session 10: CREATING AND SIGNING AN RPM PACKAGE

  • Common Vulnerabilities and Exposures (CVE’s)
  • Red Hat Package Management
  • Obtaining Detailed Update Information
  • Post Update Considerations and Rolling Back Packages
  • Details on Security Packages
  • Package Management History
  • Creating and Signing an RMP Package
  • Creating a Package Repository
  • Exercise

Session 11: PLUGGABLE AUTHENTICATION MODULES

  • PAM File Format
  • Restricting Services with PAM
  • Restricting Access to SSH
  • Increasing Password Complexity
  • Delaying Failed Logins
  • Controlling Access by Time
  • Limiting user Resources
  • Exercise

Session 12: LINUX PASSWORDS

  • Password Hashing Methods
  • Verifying Password Strength
  • Password Attacks Types
  • Password Cracking
  • Installing a Password Cracking Utility
  • Installing a Word List
  • Exercise

Linux System Security Training Course

Course Contents – DAY 4

Session 13: SUDO AND RESTRICTING LOGINS

  • Basic Examples and Command Line Options
  • Sudo Aliases,Tags and Groups
  • Sudo Password Administration
  • Running Sudo On Remote Systems
  • Sudoedit
  • Sudo Logging and Replay
  • Include Statements
  • Restricting root Access
  • Configuring Timeouts
  • Exercise

Session 14: SECURING THE LINUX FILESYSTEM

  • Partitioning Considerations
  • Protecting the Boot Menu
  • Securely Erasing Data
  • Data Sanitisation Methods
  • Extended Permissions and File Attributes
  • Creating and Modifying File Access Control Lists (ACLs)
  • LUKS Encrypted Partitions
  • Exercise

APPENDIX A: RED HAT IDENTITY MANAGEMENT

  • IRed Hat Identity Management
  • Identity Management Domain
  • IDM Server and Client Installation and Configuration

APPENDIX B: CERTIFICATE BASED AUTHENTICATION

  • Creating a Certificate Authority
  • Configuring Logging with TLS
  • Securing VSFTPD for SSL/TLS

APPENDIX C: AUDIT RECORDS

APPENDIX D: RESETTING A LOST ROOT PASSWORD

Course Overview

Linux System Administration (LPI) Course Overview

This instructor led Linux System Administration (LPI) training course is designed to teach the key administration,security,networking and performance tasks required on a Linux Enterprise system.

Similarly,the course is targeted to closely follow the official Linux Professional Institute (LPI) curriculum for certification.

Exercises and examples are used throughout the course to give practical hands-on experience with the techniques covered.

Course Objectives

Course Objectives

On completion of this course the delegate will have the required technical knowledge to administer a Linux server within the Enterprise. They will have gained practical experience of configuring administrative,networking,performance and security aspects of a Linux Enterprise system.

Course Content

Linux System Administration (LPI) Training Course

Course Contents – DAY 1

Course Introduction

  • Administration and Course Materials
  • Course Structure and Agenda
  • Delegate and Trainer Introductions

Session 1: FILE SYSTEM CONFIGURATION

  • File system types
  • The Linux I/O stack
  • MBR vs GPT partition tables
  • Partitioning a disk
  • Comparison of Linux filesystems
  • Creating Btrfs,XFS and EXT filesystems
  • Displaying disk usage
  • Mounting and unmounting file systems
  • Configuring labels and UUIDs
  • Locating files in use
  • Exercise

Session 2: ADVANCED FILE SYSTEM OPERATIONS

  • Logical Volume Management
  • Checking and repairing the file system
  • Growing file systems
  • Filesystem debugging and defragmentation
  • Listing swap areas
  • Creating and removing swap areas
  • Exercise

Linux System Administration (LPI) Training Course

Course Contents – DAY 2

Session 3: USER ACCOUNT MANAGEMENT

  • User Private Group scheme
  • Files used in creating a user
  • Adding users via the command line and YaST
  • Managing groups
  • Password administration
  • Bash Shell environment
  • Configuring user limits
  • Extended permissions
  • Configuring Privilege Delegation via sudo
  • Sudo aliases and groups
  • Monitoring login activity
  • Exercise

Session 4: PACKAGE MANAGEMENT

  • The Red Hat Package Manager (rpm)
  • Verifying Software
  • Querying installed and uninstalled packages
  • Installing and removing packages
  • Upgrade mechanism
  • Converting rpm packages to cpio format
  • Transferring files via cURL
  • The libzypp package manager
  • Exercise

Session 5: SYSTEM LOGGING

  • rsyslog configuration
  • Configuring remote logging
  • Testing using logger
  • Managing logs with logrotate
  • Basic and advanced journal queries
  • Configuring the journal
  • Exercise

Session 6: SYSTEM SECURITY AND ENCRYPTION

  • Secure shell OpenSSH
  • Public/private key authentication
  • X11 forwarding
  • The SUSE firewall
  • Encryption with GNU Privacy Guard GPG
  • Managing firewalld from the GUI and command line
  • Exercise

Linux System Administration (LPI) Training Course

Course Contents – DAY 3

Session 7: SYSTEM STARTUP AND SHUTDOWN

  • System startup process
  • Startup script framework
  • Managing services using YaST
  • Starting and stopping services dynamically
  • Creating Systemd services,timers and mount units
  • Running transient units
  • suseconfig and /etc/sysconfig
  • Changing run levels and shutdown
  • Exercise

Session 8: PROCESS MONITORING AND SCHEDULING

  • Monitoring processes
  • Graphical monitoring tools
  • Utilising terminal multiplexers
  • Monitoring with watch
  • Shared libraries
  • Scheduling processes with at
  • The cron configuration files
  • Scheduling processes with cron
  • crontab command options
  • Managing anacron
  • Exercise

Session 9: LINUX NETWORKING

  • Basic network configuration
  • IPv4 and IPv6 addressing
  • Network protocols
  • Network services and port numbers
  • Configuring IPv4 and IPv6 with ip and Network Manager
  • Configuration with systemd-networkd
  • Managing network devices
  • Resolving hostnames and DNS
  • Searching domains
  • Routing under Linux
  • Exercise

Linux System Administration (LPI) Training Course

Course Contents – DAY 4

Session 10: INTERNET SERVICES

  • Network services
  • Managing services with systemd sockets
  • Checking network service ports
  • Analysing network packets
  • Configuring and monitoring network time
  • Configuring the hardware clock
  • Remote administration
  • Configuring Virtual Network Computing
  • Exercise

Session 11: CONFIGURING PRINTERS

  • The Common Unix Printing Service CUPS
  • Printer devices and configuration
  • Installing printers
  • Configuring the CUPS server
  • Printer options
  • Print commands
  • Managing print queues
  • Exercise

Session 12: LOCALISATION

  • Localisation overview
  • Locale variables
  • Converting character sets and encoding
  • Configuring the locale and keymap
  • Configuring the system and user time zone
  • Exercise

Session 13: VIRTUALISATION,CLOUD SERVICES AND CONTAINERS

  • Configuring KVM virtualisation
  • Installing virtual systems
  • Understanding Linux Containers
  • Creating and running Docker containers
  • Iaas cloud
  • Exercise

Linux System Administration (LPI) Training Course

Course Contents – DAY 5

Session 14: DEVICES UNDER LINUX

  • Device services
  • Device file naming conventions
  • The /sys and /proc directories
  • Examining hardware
  • Hardware and software configuration messages
  • ACPI service and Desktop Bus
  • Managing disk parameters
  • Detecting new hardware
  • System overview: siga
  • Exercise

Session 15: BACKUP AND RESTORE

  • Archiving with tar and cpio
  • Device cloning with dd
  • Compressing files
  • Archiving RAR files
  • unar and other backup tools
  • Exercise

Session 16: TROUBLESHOOTING

  • Troubleshooting process
  • Booting into maintenance mode
  • Booting the rescue system
  • The SLE Maintenance Model
  • Generating information with supportconfig
  • Exercise

Addendum: Reference Materials (provided within the course handbook for additional reading)

APPENDIX A – INSTALLING LINUX

  • Installing Linux

APPENDIX B – ELECTRONIC MAIL

  • Configuring Postfix and Sendmail
  • Mail protocols
  • Mail commands

APPENDIX C – LINUX DESKTOPS AND ACCESSIBILITY

  • Configuring the X Windows GUI interface
  • Display protocols
  • The GNOME,KDE and Xfce desktops
  • Configuring the desktop for disabled users

APPENDIX D – PACKAGE MANAGEMENT

  • Additional software package management tools

APPENDIX E – DEPRECATED SERVICES

  • The xinetd Daemon
  • TCP Wrappers

APPENDIX F – ADDITIONAL COMMANDS

  • Miscellaneous Shell commands

Course Overview

Linux Shell Programming Course Overview

This Linux Bash Shell Programming training course is designed to give delegates practical experience in developing and writing LINUX shell scripts. Most of the built-in shell commands are introduced together with the main program control structures. This course is not suitable for C shell programmers.

Similarly,the course is targeted to closely follow the official Linux Professional Institute (LPI) curriculum for certification.

Exercises and examples are used throughout the course to give practical hands-on experience with the techniques covered.’

Course Objectives

To provide the skills needed to develop and customise shell programs.

Course Content

Linux Shell Programming Training Course

Course Contents – DAY 1

Course Introduction

  • Administration and Course Materials
  • Course Structure and Agenda
  • Delegate and Trainer Introductions

Session 1: LINUX COMMAND REVIEW

  • Basic Linux commands
  • General commands
  • File and directory handling commands
  • Filename generation characters and regular expressions (regex)
  • I/O Redirection features
  • Other commands

Session 2: GETTING STARTED

  • What is a shell script?
  • Development guidelines
  • Creating and editing shell scripts
  • Naming and storing shell scripts
  • Executing shell scripts
  • Exercise: Write a simple shell script

Session 3: USING VARIABLES

  • Environment variables
  • Local variables
  • Assigning values to variables
  • Assessing variable values
  • Using quotes
  • Delimiting variable names
  • Echo control sequences
  • Exercise: Add variables to a script

Session 4: INTEGER ARITHMETIC

  • Using the expr command
  • Using the (( )) notation
  • Exercise: Add integer arithmetic to a shell script

Session 5: HANDLING RUN TIME DATA

  • The read command
  • Command line arguments
  • Exercise: Writing a generic shell script
  • Exercise: Writing an interactive shell script

Session 6: CONDITIONAL EXECUTION

  • The if statement
  • The test command
  • Exercise: Adding validation to previous scripts

Session 7: ADDITIONAL KORN,BASH & POSIX SYNTAX

  • Other test notations
  • Default and substitute variables
  • Exit status codes
  • Exercise

Linux Shell Programming Training Course

Course Contents – DAY 2

Session 8: LOOP CONSTRUCTS

  • The while loop
  • The until loop
  • The for loop
  • The while true and until false loops
  • Loop control commands
  • Exercise: Enhancing the previously written scripts
  • Exercise: Writing a script to copy files using a ‘for’ loop
  • Exercise: Writing a script to generate numbers with the ‘while’ loop

Session 9: MULTI-BRANCH DECISIONS

  • The case statement
  • Menu driven applications
  • Exercise: Developing and writing a menu system

Session 10: SCRIPTING WITH AWK

  • Fundamentals of AWK
  • Basic AWK scripts
  • AWK within Bash constructs
  • Exercise: AWK scripts

Session 11: FUNCTIONS

  • What is a function?
  • Syntax
  • Examples
  • Creating a Function Library
  • Exercise: Add a function to a script

Session 12: INTERRUPT HANDLING

  • Interrupt signals
  • Trapping interrupts
  • Exercise: Adding traps to the menu script

Appendix A: ADDITIONAL FEATURES AND FACILITIES

  • The exec commands
  • The includes notation
  • More about loops
  • Arrays

Appendix B: VIM QUICK REFERENCE

Appendix C: UNIX COMMANDS QUICK REFERENCE

Appendix D: ADDITIONAL EXERCISES

Course Overview

Linux Introduction Course Overview

This Linux Operating System training course introduces the delegate to the main concepts of the LINUX Operating System. The most commonly used commands and utilities are described in detail as are the command line wildcard and redirection facilities.

The course discusses the mechanisms by which a user acquires a login environment and the main features of the Bash shell are introduced.

Similarly,the course is targeted to closely follow the official Linux Professional Institute (LPI) curriculum for certification.

Exercises and examples are used throughout the course to give practical hands-on experience with the techniques covered.

Course Objectives

To provide the skills needed to work productively in the LINUX environment.

Course Content

Linux Introduction Training Course

Course Contents – DAY 1

Course Introduction

  • Administration and Course Materials
  • Course Structure and Agenda
  • Delegate and Trainer Introductions

Session 1: INTRODUCTION TO THE LINUX OPERATING SYSTEM

  • A brief history of UNIX / Linux
  • The UNIX / Linux kernel
  • The UNIX / Linux file system structure
  • File and directory management commands
  • Absolute vs Relative Pathnames
  • Further basic commands
  • Exercise: Navigating the file system

Session 2: BASIC COMMANDS

  • Command line syntax
  • Basic file handling commands
  • Basic Directory handling commands
  • Filename wildcard characters
  • Using commands with logical AND and OR
  • Sequential command execution
  • Exercise: Manipulating files and directories

Session 3: REDIRECTION AND PIPES

  • Input and Output redirection
  • Redirecting errors
  • Piping commands
  • Exercise: Using redirection and pipe facilities

Linux Introduction Training Course

Course Contents – DAY 2

Session 4: INTRODUCTION TO THE vi/Vim EDITOR

  • Overview of the vi/Vim editor
  • The language of vi
  • Undoing and Redoing changes
  • Input Mode and Last Line Mode
  • Further vi functions
  • Executing commands within vi / Vim
  • Customising the vi / Vim Environment
  • Getting Help
  • Exercises: Using the vi editor

Session 5: SEARCHING AND REPLACING TEXT

  • Searching and replacing text using the vi/Vim editor
  • Using regular expressions (regex)
  • Using sed for search and replace
  • Searching for text with grep,egrep and fgrep
  • Exercises: Searching and Replacing Text

Session 6: RECALLING AND EDITING COMMANDS

  • Overview
  • The bash shell
  • The korn shell
  • Exercises: Recall and Edit Commands

Session 7: FILE PERMISSIONS AND ACCESS CONTROL

  • Users and user groups
  • File access permissions
  • Changing file attributes
  • Switching users and user groups
  • Linking files
  • Exercise: Setting and access permissions

Linux Introduction Training Course

Course Contents – DAY 3

Session 8: FILTERING AND FORMATTING TEXT

  • Overview
  • The paste command
  • The cut command
  • An introduction to awk
  • The nl command
  • Exercises: Filtering Text

Session 9: PROCESSES

  • What is a process?
  • Monitoring processes
  • Killing processes
  • Background processes
  • Job Control
  • Grouping commands
  • Exercise: Monitoring and controlling processes

Session 10: THE USER ENVIRONMENT

  • Customising the .profile or .bash_profile
  • Customising the .kshrc or .bashrc
  • Exercise: Setting up an environment

Session 11: MORE BASIC COMMANDS

  • The find command
  • Using xargs command
  • The locate command
  • The df command
  • The cut command
  • The sort command
  • Finding duplicate content
  • Number sequencing
  • Exercise: More Basic Commands