LinuxCBT.com

Syllabus

Focus: SUSE Enterprise Administration

Duration: 16-Hours

    • Installations
      • Identify and obtain ISO images
      • Prep VM GUEST
      • Perform Desktop installation
      • Tweak Desktop environment
      • Publish repository via HTTP
      • Perform Server installation via HTTP
      • Confirm setup and tweak
      • Discuss various installation methods
      • Perform SSH-based installation
      • Perform VNC-based installation
      • Confirm installation images
      • Evaluate SystemD Target
      • Clone GUEST installation
      • Evaluate results of various installation methods
    •  
    • Basic Linux Skills - Command Line Interface (CLI) - BASH
      • Introduction to GNOME Terminal
      • Demonstrate usage of the following useful commands & concepts
      • ls, pwd, cd, cp, mv, rm, mkdir, rmdir, whoami, man, info
      • alias, cat, file, chmod, chown, history
      • Standard in/out, UNIX Pipes, Redirection, Command Chaining
      • ps, df, free, vmstat, top, kill
      • less & more, head & tail, diff
      • which & whereis, w, who
      • Explore BASH configuration files
      • Use grep and awk to process text files
      • Archival & Compression Utilities: tar, gzip, bzip2, zip
      • Explore important facets of BASH environment
    •  
    • Common Network Clients
      • File Transfer Protocol (FTP) client
      • Install and use LFTP - FTP Client to connect to FTP resources
      • Mirror and reverse mirror using LFTP to synchronize data
      • Wget - HTTP/HTTPS/FTP connectivity
      • Explore SSH clients - Discuss features
      • Identify key SSH-client files (.known_hosts, public/private key pairs,etc.)
      • Use Secure Copy Protocol (SCP) to move data between systems non-interactively
      • Use Secure File Transfer Protocol (SFTP) to move data between systems interactively
      • Demonstrate how to generate Public/Private key (RSA/DSA) pairs using ssh-keygen
      • Copy public keys to remote systems using: ssh-copy-id
      • Demonstrate using SSHto authenticate to remote Linux hosts without passwords
      • Authenticate to remote Linux systems using alternate credentials
      • Generate Public Key/Private Key pairs for use with file and E-mail encryption
      • Demonstrate using E-mail client with GNU Privacy Guard (GPG) Open PGP for E-Mail encryption
      • Use ping, netstat, arp, telnet, traceroute, ifconfig - network diagnostics
      • Use dig, host, nslookup, whois name resolution clients
    •  
    • Users, Groups & Permissions
      • User and group creation & management concepts - passwd, shadow, group, gshadow files
      • Use lastlog to determine system-access to various terminals
      • Use YaST to create and manage users and groups
      • Use stat to ascertain file information
      • SETUID | SETGID | Sticky Bit
      • Discuss and Implement Hard and Symbolic links
    •  
    • SYSLOG | LOG ROTATE
      • Explore Boot log & System Log
      • Explanation of syslog facilities & levels
      • Discuss rSYSLOG features & enhancements
      • Demonstrate syslog administration
      • Enable rSYSLOG network listener
      • Explore automatic log rotation and customization via Logrotate
      • Configure Logrotate to rotate & compress sample log files
    •  
    • Storage Administration
      • Provision additional SWAP storage paritions and files
      • Identify allocated swap space to the kernel
      • Committ changes to /etc/fstab for persistence
      • Disable swapping with swapoff as necessary
      • Introduction to BTRFS File System
      • Explore BTRFS defaults
      • Administer important aspects of BTRFS
      • Discuss features and benefits of LVM
      • Implement Logical Volume Management (LVM)
      • Manage LVM via GUI and CLI
      • Evaluate results
    •  
    • Network - Physical & Logical Configuration
      • Identify key management tool
      • Explore interfaces across systems
      • Provision IP aliases and evaluate
      • Add network routes as needed
      • Confirm interface configuration
    •  
    • CRON - System Scheduler
      • Explore Cron Implementation
      • Explain scheduling options
      • Global and scope-based Cron options
      • Schedules jobs to run & examine the output
      • Configure individual Crontab entries
    •  
    • Implement Network Time Protocol Daemon (NTPD) Client/Server
      • Configure Network Time Protocol (NTP) to perform client/server time synchronization
      • Identify NTP bounded UDP interfaces
      • Synchronize with various NTP instancs
      • Confirm synchronization status
    •  
    • Dynamic Host Configuration Protocol (DHCP)
      • Provision dedicated broadcast domain
      • Configure DHCP scope
      • Discuss various options
      • Confirm functional configuration
      • Add reservations and test
    •  
    • Domain Name System (DNS)
      • Explore SUSE DNS configuration via YaST
      • Configure BIND as a caching-only DNS server
      • Implement Master DNS Zone
      • Configure Reverse Zone for local subnet
      • Implement Dynamic Domain Name System (DDNS) Zones (Forward/Reverse)
      • Explain DHCP and DNS update integration options
      • Integrate DHCP with DNS via Encypted Transaction Signatures (TSigs)
      • Evaluate results of BIND configuration using DIG & host
      • Implement DNS sub-domains (Third-level domains)
    •  
    • FTP Service
      • Install FTP Server
      • Explore common options
      • Test anonymous and authenticated connectivity
      • Disable anonymous access
      • CHROOT authenticated users | debug where required
    •  
    • Software Repository
      • Examine existing configuration
      • Provision HTTP repository | confirm HTTP access
      • Add Repos to configuration | evaluate
    •  
    • Apache HTTPD Server
      • Install Apache HTTPD
      • Confirm content delivery
      • Enable IP-based Virtual Hosts
      • Test access to various content
      • Transition to Name-based Virtual Hosts
      • Contrast with IP-based Virtual Hosts
    •  
    • Network Reconnaissance
      • Install NMap
      • Explore common features
      • Ascertain local resources
      • Contrast discrepancies
      • Find subnet-wide hosts
      • Perform comprehensive scan of subnet-wide hosts
    •  
    • GPG Content Protection
      • Discuss features
      • Generate usage keys
      • Share public keys
      • Encrypt and share content
      • Decrypt and confirm integrity
    •  
    • Packet Capturing
      • Discuss features
      • Capture various traffic
      • Store captures for analysis
      • Read captures with various filters
      • Capture using various BPFs
    •  
    • WireShark | Packet Analysis
      • Discuss Usage
      • Install WireShark
      • Analyze TCPDump captures
      • Reconstruct streams
      • Identify interesting packet characteristics
    •  
    • SuSE Firewall
      • Discuss features
      • Explore defaults
      • Apply custom rules
      • Apply rules to internal zone
      • Examine behavior
    •  

LinuxCBT SLES-12x Edition

  •  
DEMO