Linux Level 4 - Linux Network Server Administration Training in Bloomington

Enroll in or hire us to teach our Linux Level 4 - Linux Network Server Administration class in Bloomington, Illinois by calling us @303.377.6176. Like all HSG classes, Linux Level 4 - Linux Network Server Administration may be offered either onsite or via instructor led virtual training. Consider looking at our public training schedule to see if it is scheduled: Public Training Classes
Provided there are enough attendees, Linux Level 4 - Linux Network Server Administration may be taught at one of our local training facilities.
We offer private customized training for groups of 3 or more attendees.

Course Description

 
This five-day course helps the experienced Linux administrator develop advanced skills in configuring and managing a secure Linux network server. Students learn how to use the RPM system to create their own RPMs both for packaging your own software for standardized distribution, and for rebuilding existing packages from source RPMs. They will gain hands-on experience configuring and running essential network services, including DNS, NIS, DHCP, FTP, SSH, NTP, Samba, HTTP, Email, and LDAP. Finally, this course introduces important Linux security components, such as cryptography, Kerberos, SELinux, and network security.
Course Length: 5 Days
Course Tuition: $1690 (US)

Prerequisites

Linux Level 3 or equivalent experience.

Course Outline

 

Rebuilding Packages
The Red Hat Package Manager
Why Create Your Own RPMs
Building RPMs
Packaging Open Source Software
The Build Process
Spec File
Spec File: Preamble (Header) Section
Spec File: %Prep Section
Spec File: %build Section
Spec File: %install Section
Spec File: %clean Section
Spec File: Scriptlets Section
Spec File: %files Section
Spec File: %changelog Section
rpmbuild
Signing RPM Packages - GnuPG
Testing
Custom RPM Guidelines

Kerberos
Kerberos Principles
Initial Kerberos Authentication
Ticket Authentication
Basic Realm Configuration
Installing a Master Key Distribution Center
DNS and Kerberos
kdc.conf
kadm5.acl
kadmin
Application Servers
Kerberos Clients
Troubleshooting Kerberized Services
Kerberos Security
Preauthentication
Ticket Validation
Trusting Other Realms
Kerberos Encryption
Kerberos Service Profile

Network Time Protocol
What is NTP?
NTP Design Structure
Configuring a NTP Client
Configuring a NTP Server
Using NTP in an Enclosed Network
Specifying Restrictions

Samba
Samba Configuration
Sharing Files and Directories with Samba
Sharing Printers with Samba
Verifying the Configuration File
Samba accounts
Starting Samba
Using the smbclient command
Mounting Samba Shares

Apache
What is Apache?
Configuring Apache
The Main Tab
The Virtual Hosts Tab
Configuring Virtual Hosts
Server Settings
Performance Tuning
Starting and Stopping the httpd Daemon
Administering Squid

Email Services
Mail Configuration
Mail Protocols
IMAP/POP3 Configuration
Mail servers
Mail User Agent Configuration
Configuration of Sendmail
Configuration of PostFix

DNS & BIND
DNS Overview
Introduction to BIND
BIND's Primary Configuration File
Zone Files
Using rndc
Using the GUI-based Tool

DHCP
Introduction to DHCP
Setup the DHCP Server
Syntax of the /etc/dhcpd.conf File
Global Settings
Declaring a Subnet
Shared Networks
Using allow and deny
Address Pools
Additional Settings
The /var/lib/dhcp/dhcpd.leases File
Starting dhcpd
Setting up a DHCP Client
 
FTP Services
Setting up a VSFTP Server
Setting up Anonymous Upload
FTP Security
Limiting Access to the VSFTP Server
Modifying the Banner
FTP Logging

Cryptography
Symmetric Cryptography
Asymmetric Cryptography
Network Security
Cryptographic Tools
Using OpenSSL
Cryptographic Hashes
Using Asymmetric Encryption
Key Distribution
Digital Certificates
Transport Layer Security
TLS/SSL Handshake
Creating a RSA Private Key
Creating a Certificate Signing Request
Establishing a Certificate Authority
Managing Certificate Expiration
Managing a Certificate Revocation List

Secure Shell
Remote Access Weaknesses
Overview of the Secure Shell
Configuring the Secure Shell
User or Group Level Access Control
Using StrictModes
Features and Functionality of SSH
Authentication Methods
Additional SSH Notes
Using the Secure Shell Client Commands

Securing Services
Sever vulnerabilities
Securing portmap
NFS Security
BIND security
X Window Server
The /etc/services file
Disabling unneeded services
Kernel network parameters

NIS
What is NIS?
Configuring a NIS Server
Setting up a NIS Client
NIS Server Configuration
Configuring NIS Slave Servers

LDAP
What is LDAP?
LDAP terms
LDAP structure
Setting up a LDAP server
Migration tools
Using the ldapsearch command
Additional LDAP tools
Additional LDAP configuration

SELinux
What is SELinux?
Setting SELinux Functionality during Installation
Setting SELinux Functionality after Installation
The RHEL SELinux policy

Appendix A - Preparing for Certification Exams

Appendix B - Preparing for RHCE and RHCT Exams

Appendix C - Preparing for the LPI Exams

Appendix D - Preparing for the Linux+ Exam

Course Directory [training on all levels]

Upcoming Classes
Gain insight and ideas from students with different perspectives and experiences.

Linux Unix Uses & Stats

Linux Unix is Used For:
Desktop Mainframe Computers Mobile Devices Embedded Devices
Difficulty
Popularity
Year Created
1991/1971
Pros
Performance:
Linux supports many efficient tools and operates them seamlessly. Because it's architecture is lightweight it runs faster than both Windows 8.1 and 10. 
 
Security:
Because Linux is an open-source software,  anyone can contribute code to help enhance the users’ experience i.e., adding features, fixing bugs, reducing security risks, and more.
 
 
Software Development:
The terminal in Linux is a *wild card*. You can do almost anything with it. This includes software installation, application and server configurations, file system management, and etc.
 
Large-scale:
Open-source projects benefit from having an attentive community. As a result, Linux is more secure than Windows. Instead of installing anti viruses to clean malware, you just have to stick to the recommended repositories. 
 
Efficient: 
Developers have the convenience of running servers, training machine learning models, accessing remote machines, and compiling and running scripts from the same terminal window. 
 
Free: 
Linux is free (you can put it on as many systems as you like) and you can change it to suit your needs.
Cons
Learning Curve: 
Linux is not for everyone, there is a learning curve in switching to Ubuntu. To actually learn Linux efficiently would take a user one to several years.
 
No Tech Support:
Unlike Windows, there isn’t a dedicated tech support, so getting help for things is up to you. 
 
Designer Compatabilty:
Linux is not as user friendly as Windows or as ‘straight out of the box design’ As an example for design choices, Adobe hasn’t released any of its products to Linux users. So it’s impossible to run them directly. The Ubuntu alternative is a free software called GIMP. 
 
Gaming Capabilities: 
Most games aren’t available in Linux. But that’s not to say you can’t make it happen, it's just not as easy.   
Linux Unix Job Market
Average Salary
$85k-$105k
Job Count
n/a
Top Job Locations

New York City
Boston
San Francisco 

Complimentary Skills to have along with Linux Unix
The following are types of jobs that may require Linux skills.  The top 15 job titles on Dice.com that mention Linux in their postings are:
- DevOps Engineer
- Software Engineer
- Java Developer
- Systems Engineer
- Systems Administrator
- Senior Software Engineer
- Network Engineer
- Python Developer
- Linux Systems Administrator
- Software Developer
- System Administrator
- Linux Administrator
- Linux Engineer
- Senior Java Developer
- C++ Developer

Interesting Reads Take a class with us and receive a book of your choosing for 50% off MSRP.