This class is designed to ease Java, JBoss, Web, and Software developers, Windows admins, hardware techs, novice Unix users, and network admins into Linux/RedHat administration. This class runs on a Linux 6.3 kernel and covers more than the RedHat Admin I class. Users will learn the underlying file system, basic Unix utilities, text processing commands, and “user” administration.

Other topics including formatting a disk, making a file system, mounting file systems, mounting NFS file systems, and configuring system control files for automating the mounting of directories. The subject matter also includes directory and file permissions, process commands, backup and recovery techniques, output redirection, piping, input/output of data, and basic administration procedures using GUIs and command-line. This basic course is a prerequisite for the “System Administration II” classes from ntier Training, RedHat, Oracle/Solaris, or others. This class is customizable to meet the needs of the customer.

Audience: This course is intended for novice Unix Administrators, Java, JBoss, C, C++, and other Software Developers, Web and XML Developers, advanced Unix Users, IT managers, users who have to do data manipulation and do advanced print formatting, hardware technicians, OS installers, and network administrators.
Course Duration: 5 days
Prerequisites:

Users should have basic window knowledge, mainframe or hardware background.

Course Objectives:
  • Understanding the architecture of a Unix system
  • Using a Window system
  • Using 10 basic GUIs to modify the OS
  • Using an editor to modify the bash shell startup files
  • Creating and navigating directories
  • Creating, displaying, copying, renaming, moving, linking, and removing files and/or directories
  • Learning Regular Expressions for grep, vi, awk, and other utilities
  • Using grep, head, tail, more, sort, wc, and other data processing commands
  • Learning the vi/vim editor (best), nano editor, gedit, or note pad
  • Modifying permissions that control directory and file security
  • Doing simple archiving/backups, compressing, and restoring files
  • Doing commands on remote systems using rsync, ssh, and scp
  • Formatting disk drives
  • Making and mounting file systems of different types
  • Automating the mounting of local and remote file systems
  • Making Logical Volumes that can expand and reduce file systems
  • Starting and monitoring commands, and then killing processes
  • Adding, securing, protecting, and removing “Users” to the system
  • Working with Access Control and Collaborative directories
  • Working with network files and commands
  • Making and passing GNU keys between networked systems
  • Working as root and non-root and configuring SUDO (pseudo root)
  • Adding, updating, and removing software with a GUI, the RPM command or the yum command
Course Outline:
  • Unix and Shell History
    • Bash shell basics, .bashrc, environment variables, aliases, and history
    • Unix/Network overview
    • Making files and directories
    • Creating hard and symbolic links
    • Working with files and directories
    • Basic Unix file utilities; for example, cp, rm, mv, ln, and ln -s
    • Basic text/data manipulation commands ; for example, head, tail, wc, -l sort, unique, and grep
    • The vi/vim editor, nano, or gedit
    • The find command
    • The grep command and Regular Expressions
    • Processes, background tasks, and processes killing commands
    • File and Directory security
    • ACLs (Access Control Language) bits for shared files and directories
    • Collaborative Directories among users and groups
    • SUDO (pseudo root)
    • Disk formatting
    • Making and mounting file systems
    • Logical Volume Management using a GUI and/or CLI
    • Network commands; for example , ssh, scp, ssh-copy-id, and rsync
    • GPG key generation, key copying , and basic network security
    • Basic shell-scripting commands and extras
    • RPM commands
    • YUM commands