Linux Administration

Linux is everywhere, and it's difficult. Make sure you know it.
Overview

Linux is almost the only operating system used on both small devices (IoT), and very large computers. Interested in Cyber security? The only tools professionals ever use for Penetration Testing all run on Linux (Kali, Parrot).

Every year Microsoft incorporates more Linux into their offerings. Windows 10 can natively run many Linux apps (via Windows Subsystem for Linux). .NET applications are now expected to also work on Linux machines (via Docker containers).

Linux is predominantly command-line driven, with awkward and often obscure commands. Consequently, it's super easy to make mistakes. This course will teach you what you need to know to avoid mistakes and learn to love Linux. Our Linux courses are always delivered on a fully up-to-date version of Linux (usually CentOS), but also always cover the differences between the major Linux distros (Red Hat Enterprise RHEL, Fedora, Debian, Ubuntu, Kali, Mint, SUSE etc.)

Course Code
LINX3ADM
Duration
3 Days
Delivery Style
Classroom
Course Type
Public or Private
Max Delegates
12
Available as Nutshell
No

Book your team training at your premises

  • Date
  • Venue
  • Cost
  • More info

Book your place

  • Date
  • Venue
  • Cost
  • Availability
  •  
  • 08 Jul 2019
  • VenueWorcester
  • Cost£1,197
  • AvailabilityAvailable
  • Book Now
  • 04 Nov 2019
  • VenueWorcester
  • Cost£1,197
  • AvailabilityAvailable
  • Book Now
Purpose of this course

The course is aimed at taking existing UNIX/Linux users through activities associated with the responsibility of running and managing Linux servers, focusing not just upon what to do and how to do it, but also who and when.

Who is this course for

Those who need to expand their basic knowledge of Linux to enable them to successfully administer all versions of Linux.

You will learn how to
  • Understand the roles and duties of a systems administrator
  • Manage server resources including users/software/hardware/printers/performance
  • Understand service continuity activities such as disaster recovery measures

Recent years have seen big changes in the UNIX/Linux world. For example: init and syslogd have been replaced with systemd; GRUB has been replaced with GRUB2; ext4 replaced with xfs and btrfs; physical partitions replaced with LVM; iptables replaced with firewalld; ifconfig, route, arp and netstat replaced with ip and ss; and Gnome 2 replaced with Gnome 3. Here at Quanta, we keep a close eye on changes, and update our courses on a regular basis to ensure you always learn all you need to keep your skills current.

Benefits for your organisation

By configuring servers correctly, not only can organisations demonstrate compliance and assurance with quality standards, but also proactively monitor and manage servers such that downtime becomes only a vague memory. Free stuff only provides value if it is in the right place and correctly utilised - if your organisation uses Linux servers, you need someone who knows what they are and what they can do, else they'll just become a burden.

Benefits for you as an individual

Your Linux servers are capable of so much, much of which is hidden, completely free and well-supported. This course will peel back the layers and expose you to a vast array of monitoring, reporting, managing and optimising toolsets that will enable you to be proactive at managing changes, watching systems and reacting quickly to threats. Think about being in a position of control, of adding new features to help your daily work without having to obtain financial approval or find funding...doesn't that feel good?

Overview of Linux

  • What is Linux?
  • Different Linux Distributions
  • Differences between Linux and UNIX
  • Linux Features
  • Desktop Environments
  • Linux on Microsoft Hyper-V
  • RDP in to Microsoft Machines
  • Windows Subsystem for Linux (WSL)
  • The Superuser
  • System Administration Tools
  • Documentation 

User Management

  • User Management Overview
  • The Password File
  • The Shadow File
  • User Management Commands
  • Group Management Commands
  • Graphical User/Group Management Tools 
  • The User Environment
  • Customising User Sessions

Basic Security and Log Files

  • Why Security?
  • Password Aging
  • Privilege Escalation
  • The SSH Commands
  • Network Login as root
  • Security Files
  • System Log Files
  • Firewall Configuration
  • iptables
  • The firewalld Service
  • SELinux

Installing Software and Patches

  • Software Installation Methods
  • Package Management With RPM
  • Configuration and Using yum
  • Package Management with dpkg
  • Configuring and Using apt
  • Other Tools
  • Graphical Package Management
  • Patching Linux
  • Upgrading Linux
  • Installing Linux
  • Kernel Upgrades

Hardware Management

  • Device Files
  • Creating Devices Files
  • Hardware Reporting Tools
  • What Device Drivers do I have?
  • Monitoring Hardware

Disk Management

  • Linux Directory Layout
  • Partitions Overview
  • Partitioning a Disk
  • Graphical Disk Management Tools
  • Traditional Disk Storage v LVM
  • Overview of LVM
  • LVM Concepts

Filesystems

  • Filesystem Types
  • Linux Filesystem Structure
  • Creating Filesystems
  • Using Filesystems
  • Filesystems Mounted at Boot
  • Removing a Filesystem
  • Graphical Filesystem Tools

Filesystem Maintenance

  • Monitoring Filesystem Consumption
  • Limiting Consumption
  • Expanding/Reducing Filesystems
  • Fixing Broken Filesystems
  • Managing Virtual Memory

Performance Monitoring

  • Understanding Processes
  • Background Processes
  • Examining Processes
  • Killing Processes
  • System Monitoring

Job Scheduling

  • Writing Shell Scripts
  • Scheduling One-off jobs
  • Regular Job Scheduling

Backup and Restoring

  • Why Back Up?
  • Backup Targets
  • Backup Commands
  • Graphical Backup Tools
  • Points to Remember

Booting and Shutting Down

  • Boot Loaders
  • The Kernel
  • The Boot Sequence
  • Configuring Services
  • Controlling Services
  • Automatic Startup
  • Configuration Before systemd
  • Configuring Services with systemd
  • Shutting the System Down

Disaster Recovery

  • Boot Failures
  • Problems with Non-Critical Files
  • Corrupt or Missing Critical Files
  • In Conclusion

Linux Networking

  • Getting Network Information
  • Network Files
  • Changing Network Information
  • Other Useful Commands
Prerequisites

This course assumes that the delegate has already gained a good understanding of basic UNIX commands. This can be achieved by attending our UNIX/Linux Introduction course.

About the Lead Trainer

No training is dull with Tim. He oozes a real pleasure in teaching people stuff they don’t know. Tim loves developing new courses and sharing his knowledge at many on-site customer locations. In addition to training, Tim is an experienced consultant, advising on company computing requirements.  Did we mention that he also likes to read computing books and blogs in his spare time?