新版RHCE(基于RHEL7)全国首开 7月13日开课
上课时间周日上午9点~下午17点。点击报名>>
课程大纲:
RH124
Red Hat System Administration I
1. Red Hat System Administration I
2. Orientation to the Classroom Environment
1.1. Accessing the Command Line Using the Local Console
1.2. Practice: Local Console Access Terms
1.3. Accessing the Command Line Using the Desktop
1.4. Practice: The GNOME 3 Desktop Environment
1.5. Executing Commands Using the Bash Shell
1.6. Practice: Bash Commands and Keyboard Shortcuts
1.7. Lab: Accessing the Command Line
2. Managing Files From the Command Line
2.1. The Linux File System Hierarchy
2.2. Practice: File System Hierarchy
2.4. Practice: Locating Files and Directories
2.5. Managing Files Using Command-Line Tools
2.6. Practice: Command-Line File Management
2.7. Matching File Names Using Path Name Expansion
2.8. Practice: Path Name Expansion
2.9. Lab: Managing Files with Shell Expansion
3. Getting Help in Red Hat Enterprise Linux
3.1. Reading Documentation Using man Command
3.2. Practice: Using the man Command
3.3. Reading Documentation Using pinfo Command
3.4. Practice: Using the pinfo Command
3.5. Reading Documentation in /usr/share/doc
3.6. Practice: Viewing Package Documentation
3.7. Getting Help From Red Hat
3.8. Practice: Creating and Viewing an SoS Report
3.9. Lab: Viewing and Printing Help Documentation
4. Creating, Viewing, and Editing Text Files
4.1. Redirecting Output to a File or Program
4.2. Practice: I/O Redirection and Pipelines
4.3. Editing Text Files from the Shell Prompt
4.4. Practice: Editing Files with Vim
4.5. Editing Text Files with a Graphical Editor
4.6. Practice: Copying Text Between Windows
4.7. Lab: Creating, Viewing, and Editing Text Files
5. Managing Local Linux Users and Groups
5.2. Practice: User and Group Concepts
5.4. Practice: Running Commands as root
5.5. Managing Local User Accounts
5.6. Practice: Creating Users Using Command-line Tools
5.7. Managing Local Group Accounts
5.8. Practice: Managing Groups Using Command-line Tools
5.10. Practice: Managing User Password Aging
5.11. Lab: Managing Local Linux Users and Groups
6. Controlling Access to Files with Linux File System Permissions
6.1. Linux File System Permissions
6.2. Practice: Interpreting File and Directory Permissions
6.3. Managing File System Permissions from the Command Line
6.4. Practice: Managing File Security from the Command Line
6.5. Managing Default Permissions and File Access
6.6. Practice: Controlling New File Permissions and Ownership
6.7. Lab: Controlling Access to Files with Linux File System Permissions
7. Monitoring and Managing Linux Processes
7.4. Practice: Background and Foreground Processes
7.6. Practice: Killing Processes
7.7. Monitoring Process Activity
7.8. Practice: Monitoring Process Activity
7.9. Lab: Monitoring and Managing Linux Processes
8. Controlling Services and Daemons
8.1. Identifying Automatically Started System Processes
8.2. Practice: Identify the Status of systemd Units
8.3. Controlling System Services
8.4. Practice: Using systemctl to Manage Services
8.5. Lab: Controlling Services and Daemons
9. Configuring and Securing OpenSSH Service
9.1. Accessing the Remote Command Line with SSH
9.2. Practice: Accessing the Remote Command Line
9.3. Configuring SSH Key-based Authentication
9.4. Practice: Using SSH Key-based Authentication
9.5. Customizing SSH Service Configuration
9.6. Practice: Restricting SSH Logins
9.7. Lab: Configuring and Securing OpenSSH Service
10. Analyzing and Storing Logs
10.2. Practice: System Logging Components
10.4. Practice: Finding Log Entries
10.5. Reviewing systemd Journal Entries
10.6. Practice: Finding Events With journalctl
10.7. Preserving the systemd Journal
10.8. Practice: Configure a Persistent systemd Journal
10.9. Maintaining Accurate Time
10.10. Practice: Adjusting System Time
10.11. Lab: Analyzing and Storing Logs
11. Managing Red Hat Enterprise Linux Networking
11.2. Practice: Networking Concepts
11.3. Validating Network Configuration
11.4. Practice: Examining Network Configuration
11.5. Configuring Networking with nmcli
11.6. Practice: Configuring Networking with nmcli
11.7. Editing Network Configuration Files
11.8. Practice: Editing Network Configuration Files
11.9. Configuring Host Names and Name Resolution
11.10. Practice: Configuring Host Names and Name Resolution
11.11. Lab: Managing Red Hat Enterprise Linux Networking
12. Archiving and Copying Files Between Systems
12.1. Managing Compressed tar Archives
12.2. Practice: Backing Up and Restoring Files From a tar Archive
12.3. Copying Files Between Systems Securely
12.4. Practice: Copying Files Over the Network With scp
12.5. Synchronizing Files Between Systems Securely
12.6. Practice: Synchronizing Two Directories Securely With rsync
12.7. Lab: Archiving and Copying Files Between Systems
13. Installing and Updating Software Packages
13.1. Attaching Systems to Subscriptions for Software Updates
13.2. Practice: Red Hat Subscription Management
13.3. RPM Software Packages and Yum
13.4. Practice: RPM Software Packages
13.5. Managing Software Updates with yum
13.6. Practice: Installing and Updating Software with yum
13.7. Enabling yum Software Repositories
13.8. Practice: Enabling Software Repositories
13.9. Examining RPM Package Files
13.10. Practice: Working with RPM Package Files
13.11. Lab: Installing and Updating Software Packages
14. Accessing Linux File Systems
14.1. Identifying File Systems and Devices
14.2. Practice: Identifying File Systems and Devices
14.3. Mounting and Unmounting File Systems
14.4. Practice: Mounting and Unmounting File Systems
14.5. Making Links Between Files
14.6. Practice: Making Links Between Files
14.7. Locating Files on the System
14.8. Practice: Locating Files on the System
14.9. Lab: Accessing Linux File Systems
15.1. Managing a Local Virtualization Host
15.2. Practice: Managing a Local Virtualization Host
15.3. Installing a New Virtual Machine
15.4. Practice: Installing a New Virtual Machine
15.5. Chapter Test: Using Virtualized Systems
16.1. Red Hat System Administration I Comprehensive Review
16.2. Lab: Comprehensive Review
RH134
Red Hat System Administration II
1. Red Hat System Administration II
2. Orientation to the Classroom Environment
1. Automating Installation with Kickstart
1.1. Defining the Anaconda Kickstart System
1.2. Practice: Kickstart File Syntax and Modification
1.3. Deploying a New Virtual System with Kickstart
1.4. Practice: Installing a System Using Kickstart
1.5. Chapter Test: Automating Installation with Kickstart
2. Using Regular Expressions with grep
2.1. Regular Expressions Fundamentals
2.2. Practice: Match the Regular Expression
2.4. Practice: Using grep with Logs
2.5. Lab: Using Regular Expressions with grep
3. Creating and Editing Text Files with vim
3.4. Practice: Basic vim Workflow
3.6. Practice: Edit a File with vim
3.7. Lab: Edit a System File with vim
4. Scheduling Future Linux Tasks
4.1. Scheduling One-Time Tasks with at
4.2. Practice: Scheduling One-Time Tasks with at
4.3. Scheduling Recurring Jobs with cron
4.4. Practice: Scheduling Recurring Jobs with cron
4.5. Scheduling System cron Jobs
4.6. Practice: Scheduling System cron Jobs
4.8. Practice: Managing Temporary Files
4.9. Chapter Test: Scheduling Future Linux Tasks
5. Managing Priority of Linux Processes
5.1. Process Priority and "nice" Concepts
5.2. Practice: Process Priority and "nice" Concepts
5.3. Using nice and renice to Influence Process Priority
5.4. Practice: Discovering Process Priorities
5.5. Lab: Managing Priority of Linux Processes
6. Controlling Access to Files with Access Control Lists (ACLs)
6.1. POSIX Access Control Lists (ACLs)
6.4. Practice: Using ACLs to Grant and Limit Access
6.5. Lab: Controlling Access to Files with Access Control Lists (ACLs)
7.1. Enabling and Monitoring Security Enhanced Linux (SELinux)
7.2. Practice: SELinux Concepts
7.4. Practice: Changing SELinux Modes
7.5. Changing SELinux Contexts
7.6. Practice: Changing SELinux Contexts
7.7. Changing SELinux Booleans
7.8. Practice: Changing SELinux Booleans
7.10. Practice: Troubleshooting SELinux
7.11. Lab: Managing SELinux Security
8. Connecting to Network-defined Users and Groups
8.1. Using Identity Management Services
8.2. Practice: Connecting to a Central LDAP and Kerberos Server
8.3. Lab: Connecting to Network-defined Users and Groups
9. Adding Disks, Partitions, and File Systems to a Linux System
9.1. Adding Partitions, File Systems, and Persistent Mounts
9.2. Practice: Adding Partitions, File Systems, and Persistent Mounts
9.4. Practice: Adding and Enabling Swap Space
9.5. Lab: Adding Disks, Partitions, and File Systems to a Linux System
10. Managing Logical Volume Management (LVM) Storage
10.1. Logical Volume Management Concepts
10.2. Practice: Logical Volume Management Concepts
10.3. Managing Logical Volumes
10.4. Practice: Adding a Logical Volume
10.5. Extending Logical Volumes
10.6. Practice: Extending a Logical Volume
10.7. Lab: Managing Logical Volume Management (LVM) Storage
11. Accessing Network Storage with Network File System (NFS)
11.1. Mounting Network Storage with NFS
11.2. Practice: Mounting and Unmounting NFS
11.3. Automounting Network Storage with NFS
11.4. Practice: Automounting NFS
11.5. Lab: Accessing Network Storage with Network File System (NFS)
12. Accessing Network Storage with SMB
12.1. Accessing Network Storage with SMB
12.2. Practice: Mounting a SMB File System
12.3. Lab: Accessing Network Storage with SMB
13. Controlling and Troubleshooting the Red Hat Enterprise Linux Boot Process
13.1. The Red Hat Enterprise Linux Boot Process
13.2. Practice: Selecting a Boot Target
13.3. Repairing Common Boot Issues
13.4. Practice: Resetting a Lost root Password
13.5. Repairing File System Issues at Boot
13.6. Practice: Repairing Boot Problems
13.7. Repairing Boot Loader Issues
13.8. Practice: Repairing a Boot Loader Problem
13.9. Chapter Test: Controlling and Troubleshooting the Red Hat Enterprise Linux Boot Process
14. Limiting Network Communication with firewalld
14.1. Limiting Network Communication
14.2. Practice: Limiting Network Communication
14.3. Lab: Limiting Network Communication
15. Comprehensive Review of System Administration II
15.1. Red Hat System Administration II Comprehensive Review
15.2. Lab: Comprehensive Review of System Administration II
RH254
Red Hat System Administration III
1. Red Hat System Administration III
2. Orientation to the Classroom Environment
1. Controlling Services and Daemons
1.1. Controlling Services with systemctl
1.2. Practice: Using systemctl to Manage Services
1.3. Controlling the Boot Process
1.4. Practice: Selecting a Boot Target
1.5. Reviewing the System Logs and Journal
1.6. Practice: Finding Events With journalctl
1.7. Lab: Controlling Services and Daemons
2.1. Review of IPv4 Networking Configuration
2.2. Practice: Configuring IPv4 Networking
2.4. Practice: Interpreting IPv6 Addresses
2.5. IPv6 Networking Configuration
2.6. Practice: Configuring IPv6 Networking
2.7. Lab: Managing IPv6 Networking
3. Configuring Link Aggregation and Bridging
3.1. Configuring Channel Bonding
3.2. Practice: Configuring Channel Bonding
3.3. Configuring Network Teaming
3.4. Practice: Configuring Network Teaming
3.6. Practice: Managing Network Teaming
3.7. Configuring Software Bridges
3.8. Practice: Configuring Software Bridges
3.9. Lab: Configuring Link Aggregation and Bridging
4.2. Practice: Configuring a Firewall
4.4. Practice: Writing Custom Rules
4.5. Masquerading and Port Forwarding
4.6. Practice: Forwarding a Port
4.7. Adding Custom firewalld Zones and Services
4.8. Practice: Configure a Custom Firewall
4.9. Managing SELinux Port Labeling
4.10. Practice: Managing SELinux Port Labeling
4.11. Lab: Network Port Security
5.2. Practice: DNS Resource Record
5.3. Configuring a Caching Nameserver
5.4. Practice: Configuring unbound as a Caching Nameserver
5.6. Practice: Troubleshooting DNS
5.7. Lab: Managing DNS for Servers
6. Configuring Email Transmission
6.2. Practice: Sending Email with Telnet
6.3. Configuring a Send-only Email Configuration
6.4. Practice: Configuring a Send-only Email Configuration
6.5. Configuring Send-only Email with Mail Submission Agents
6.6. Practice: Configuring Send-only Email with Mail Submission Agents
6.7. Lab: Configuring Email Transmission
7. Providing Remote Block Storage
7.4. Practice: Providing iSCSI Targets
7.6. Practice: Accessing iSCSI Storage
7.7. Lab: Providing Block-based Storage
8. Providing File-based Storage
8.1. Exporting NFS File Systems
8.2. Practice: Exporting NFS File Systems
8.4. Practice: Protecting NFS Exports
8.5. Providing SMB File Shares
8.6. Practice: Providing SMB File Shares
8.7. Performing a Multiuser SMB Mount
8.8. Practice: Performing a Multiuser SMB Mount
8.9. Lab: Providing File-based Storage
9. Configuring MariaDB Databases
9.2. Practice: Installing MariaDB
9.3. Working with MariaDB Databases
9.4. Practice: MariaDB Commands
9.5. Managing Database Users and Access Rights
9.7. Creating and Restoring MariaDB Backups
9.8. Practice: Restoring a MariaDB Database from Backup
9.9. Lab: Configuring MariaDB Databases
10. Providing Apache HTTPD Web Service
10.1. Configuring Apache HTTPD
10.2. Practice: Configuring a Web Server
10.3. Configuring and Troubleshooting Virtual Hosts
10.4. Practice: Configuring a Virtual Host
10.6. Practice: Configuring a TLS-enabled Virtual Host
10.7. Integrating Dynamic Web Content
10.8. Practice: Configuring a Web Application
10.9. Lab: Providing Apache HTTPD Web Service
11.1. Bash Shell Scripting Basics
11.2. Practice: Writing Bash Scripts
11.3. Lab: Writing Bash Scripts
12. Bash Conditionals and Control Structures
12.1. Enhancing Bash Shell Scripts with Conditionals and Control Structures
12.2. Practice: Enhancing Bash Shell Scripts with Conditionals and Control Structures
12.3. Lab: Bash Conditionals and Control Structures
13. Configuring the Shell Environment
13.1. Changing the Shell Environment
13.2. Practice: Working with Login and Non-Login Shells
13.3. Lab: Configuring the Shell Environment
14. Linux Containers and Docker
14.1. Introduction to Linux Containers
15.1. Red Hat System Administration III Comprehensive Review
15.2. Lab: Comprehensive Review of System Administration III