Course : Unix/Linux Exploit and Deployment

Unix/Linux Exploit and Deployment




This training will teach you how to manage and exploit your computer production environment.


INTER
IN-HOUSE
CUSTOM

Practical course in person or remote class

Ref. UXE
  4d - 28h00
Price : Contact us




This training will teach you how to manage and exploit your computer production environment.



Prerequisites
The students should be able to use basic computer hardware (monitor, keyboard, and mouse).

Course schedule

1
Concepts

  • Tasks and rôles.
  • Method.
  • Audit.
  • System Administration Tools.
  • Real and virtual machines.
Hands-on work
Overview of admin tools.

2
Installing the system and packages

  • Installing a system.
  • Managing rpm packages.
  • Updating machines.
  • Troubleshooting.
Hands-on work
Installing the system and a rpm package.

3
Volume Management

  • Disks.
  • File systems.
  • Partitioning, RAID.
  • Monitoring and availability.
Hands-on work
Formating, disk partitioning, using logical volumes and creating a file system.

4
Backup and Restore Data

  • Concepts.
  • Planning backups.
  • Full, differential and incremental backups.
  • Restore
Hands-on work
Configuring backups, planning the restore.

5
Network Configuration

  • Network concepts.
  • Protocols : SMTP, POP3, HTTP, DNS, DHCP, …
  • Managing servers.
  • Maintenance : ping, traceroute.
Hands-on work
Configuring the network, setting up samba, DHCP, DNS.

6
Monitoring your system with Nagios

  • Monitoring your system.
  • Setting up Nagios.
  • Customizing Nagios.
Hands-on work
Installing Nagios, managing an incident.

7
Writing scripts in bash and zsh

  • Review of shell basics.
  • Command line.
  • Creating a shell script.
  • Specific shell features.
  • Text file processing
  • Using sed and awk.
  • Making reports.
Hands-on work
Managing scripts, reports, troubleshooting. Log rotation.


Dates and locations
Select your location or opt for the remote class then choose your date.
Remote class