Preloader

Overview


Linux RHCE Certification Training in Delhi

The RHCE is aimed at Linux system administrators who have hands-on experience configuring and administrating networks that run Red Hat Enterprise Linux. Here are some tasks that certified engineers typically perform :


  • Module: Overview

  •  Objectives
  •  Agenda
  •  UNIX History
  •  UNIX Principles
  •  GNU Project/FSF
  •  GPL – GNU General Public License
  •  Linux Origins
  •  Red hat Enterprise Linux
  •  Recommended Hardware Specifications
  •  Local Logins
  •  Virtual Consoles
  •  Running Commands
  •  Changing Your Password
  •  Linux Graphical Environments
  • Module: GNOME and KDE Desktops

  •  Objectives
  •  Agenda
  •  The X Window System
  •  GNOME
  •  KDE
  •  Starting XFree86
  •  Switching Between GNOME and kde
  •  Nautilus
  •  Graphical Terminals
  •  Graphical Editors
  •  Web Browsers
  •  OpenOffice.org Office Suite
  •  Useful Keystrokes in X
  •  Useful Keystrokes in X, continues: Copy& Paste
  • Module: Users, Groups, and Permissions

  •  Objectives
  •  Agenda
  •  Users
  •  Groups
  •  He root User
  •  The Linux Security
  •  Linux File Security
  •  Linux Process Security
  •  Examing Permissions
  •  User Categories
  •  File Permission Types
  •  Examining Directories
  •  Examining User Permissions
  •  Examining Group Permissions
  •  Examining Other Permissions
  •  Changing Permissions – Symbolic Method
  •  Changing Permissions – Numeric Method
  • Module: The Linux File system

  •  Objectives
  •  Agenda
  •  Partitions and File Systems
  •  Inodes
  •  Directories
  •  Cp and Inodes
  •  Mv and Inodes
  •  Rm and Inodes
  •  Symbolic ( or Soft ) Links
  •  Hard Links
  •  The Seven Fundamental Filetypes
  •  Checking Free Space
  •  Find
  •  Finding and Processing Files
  •  Mounting Removable Media
  •  Why Archive Files?
  •  Creating an Archive
  •  Inspecting Archives
  •  Extracting an Archive
  •  Why Use File Compression?
  •  Compression Utilities
  •  Using Compression
  •  Compressing Archives
  • Module: The bash Shell and Configuration

  •  Objectives
  •  Agenda
  •  The bash Shell and Configuration
  •  Variables
  •  Configuring the Shell: Local Variables
  •  Common Local Variables
  •  The PS1 Local Variable
  •  Aliases
  •  Other Shell Configuration Methods
  •  Configuring Commands: Environment Variables
  •  Common Environment Variables
  •  The TRM Environment Variable
  •  The PATH Environment Variable
  •  How the Shell Expands the Command Line
  •  Shell Shartup Scripts
  •  Login Shells
  •  Startup Scripts: Order of Execution
  • Module: Advanced Uses of the vi and vim Editors

  •  Objectives
  •  Agenda
  •  File Repositioning
  •  Screen Repositioning
  •  Filtering
  •  Ex mode: Search and Replace
  •  Advance Reading and Saving
  •  Configuring vi and vim
  •  Expanding you Vocabulary
  •  A Peak at the Appendix
  • Module: Introduction to String Processing

  •  Objectives
  •  Agenda
  •  Head
  •  Tail
  •  Tail – Continued
  •  Wc
  •  Sort
  •  Uniq
  •  Cut
  •  Other String Processing
  •  Version Comparison with diff
  •  Spell Checking
  •  Formatting Tools
  • Module: Introduction to Processes

  •  Objectives
  •  Agenda
  •  What is a Process?
  •  How Processes Are Created
  •  Process Ancestry
  •  Process States
  •  Viewing Processes
  •  Sending Signals to Processes
  •  Terminating Processes
  •  Altering Process Scheduling Priority
  •  Running a Process in the Foreground
  •  Running a Process in the Background
  •  Suspending a Process
  •  Listing Background and Suspended Jobs
  •  Resuming Suspended Jobs
  •  Compound Command
  •  Scheduling a Process to Execute Later
  •  Scheduling Periodic Processes
  •  Using cron
  •  Crontab File Format
  • Module: Basic Networking Clients

  •  Objectives
  •  Agenda
  •  Ssh: Secure Shell
  •  Scp: Secure Copy
  •  telnet and the “r” Services
  •  iftp
  •  mutt
  •  rsync
  •  wget
  •  Network Diagnostic Tools
  • Module: Hardware, Device Configuration, and Installation

  •  Objectives
  •  Agenda
  •  Initial Installation
  •  Hardware Overview
  •  Hardware Compatibility
  •  General Hardware Resources
  •  CPU and Memory
  •  Filesystem Device Nodes
  •  System Bus Support
  •  Hotswappable Bus Support
  •  Laptops
  •  Disk Partitioning
  •  Sample Partition Structure
  •  Block Devices and Flesystems
  •  Filesystem Schemes
  •  The Red Hat Installer
  •  Installer Features
  •  Red hat Linux Installation
  •  Partitioning hard Drives
  •  Software RAID
  •  LVM: Logical Volume Manager
  •  Network Configuration
  •  Firewall Setup
  •  Package Selection
  •  Validating the Installation
  •  Serial Console Installation
  •  Noprobe Mode and Driver Disks
  •  Post-Install Configuration
  •  System Configuration
  • Module: System Initialization and Services

  •  Objectives
  •  Agenda
  •  Boot Sequence
  •  BIOS Initialization
  •  Boot Loader
  •  Kernel Initialization
  •  Init Initialization
  •  Run Levels
  •  Daemon Processes
  •  /etc/rc.d/rc.sysinit
  •  /etc/rc.d/rc
  •  System V run Levels
  •  /etc/rc.d/rc.local
  •  Virtual Consoles
  •  Controlling Services
  •  System Shutdown
  •  System Reboot
  • Module: Network Configuration

  •  Objectives
  •  Agenda
  •  Device Recognition
  •  Network Interfaces
  •  Address Resolution Protocol
  •  mii-tool
  •  ifconfig
  •  ifup/ifdown
  •  Interface Configuration Files
  •  Configuration Utilities
  •  Multiple NICs
  •  Binding Multiple IP Addresses
  •  DHCP/BOOTP
  •  Allowing User Control of Network Interfaces
  •  Basic IP Routes
  •  Default Route
  •  IP Forwarding
  •  Global Network Parameters
  •  Name Resolution
  •  DNS Client Configuration
  •  DNS Troubleshooting
  •  Network Diagnostics
  • Module: RPM, Boot Loaders, and Kickstart

  •  Objectives
  •  Agenda
  •  The RPM Way
  •  RPM Package Manager
  •  Installing and Removing Software
  •  Updating a Kernel RPM
  •  RPM Queries
  •  RPM Queries and Verification
  •  Other RPM Utilities and Features
  •  Red Hat Network (RHN)
  •  Automatic Dependency Resolution
  •  RHN in the Enterprise
  •  RHN Registration
  •  Remote Administration
  •  Boot Loader Components
  •  GRUB and grub.conf
  •  Starting the Boot Process: GRUB
  •  Multiboot Systems
  •  Ted Hat Linux Network Installation Server
  •  Using Kickstart to Automate Installation
  •  Kickstart: Commands Section
  •  Kickstart: Packages
  • Module: The X Window System

  •  Objectives
  •  Agenda
  •  The X Window System
  •  The X Protocol
  •  Network- Transparent
  •  X Security
  •  Xauth with ssh
  •  X Modularity
  •  Window Managers
  •  Display Managers
  •  XFree86 Startup (startx)
  •  XFree86 Startup (prefdm)
  •  Extensibility
  •  X Server Configuration
  •  X Server Design
  •  The X Font Server
  • Module: Introduction to System Services

  •  Objectives
  •  Agenda
  •  Service Management
  •  Services Managed by init
  •  System V service Management
  •  Chkconfig
  •  Xinetd Managed Series
  •  The xinetd Daemon
  •  The/etc/sysconfig/ files
  •  Fault Analysis
  • Module: Network File Sharing Services

  •  Objectives
  •  Agenda
  •  NFS File Service (NFS)
  •  SFS Server
  •  Client-side NFS
  •  FTP
  •  Service Profile: FTP
  •  Samba Services
  •  Samba Daemons
  •  Service Profile: SMB
  •  Configuring Samba
  •  Overview of smb.conf Sections
  •  Configuraring File and Directory Sharing
  •  Printing to the Samba Server
  •  Authentication Methods
  •  Nmblookup
  •  Smbmount
  • Module: The HTTP Service

  •  Objectives
  •  Agenda
  •  Apache Overview
  •  Service Profile:HTTPD
  •  Apache Configuration
  •  Apache Server Configuration
  •  Virtual Hosts
  •  Apache Namespace Configuration
  •  Apache Access Configuration
  •  CGI
  •  Notable Apache Modules
  •  Apache Encrypted Web Server
  •  Squid Web Proxy Cache
  •  Service Profile: Squid
  • Module: Authentication Services

  •  Objectives
  •  Agenda
  •  Authentication Basics
  •  Service Profile: PAM
  •  PAM Operation
  •  /etc/pam.d/system-auth
  •  Core PAM Modules
  •  Authentication Modules
  •  Password Security
  •  Password Policy
  •  Resource Limits
  •  User Access Control
  •  Single User Mode
  •  Sudo
  •  Authentication Troubleshooting
  •  NIS Overview
  •  Service Profile: NIS
  •  NIS Server Topology
  •  Configuring an NIS Server
  •  NIS Client Configuration
  •  NIS Troubleshooting
  • Module: Security Networks

  •  Objectives
  •  Agenda
  •  Routing Principles
  •  Net filter Overview
  •  Net filter Architecture
  •  Net Filter Tables and Chains
  •  Net filter Packet Flow
  •  Rule Matching
  •  Rule Targets
  •  Simple Example
  •  Basic Chain Operations
  •  Directional Filtering
  •  Connection Tracking
  •  Network Address Translation (NAT)
  •  Rule Persistence
  • Module: Command Line File system Browsing

  •  Objectives
  •  Agenda
  •  Linux File Hierarchy Concepts
  •  Current Working Directory
  •  Changing Directories
  •  Listing Directory Contents
  •  The Home Directory
  •  Absolute Pathnames
  •  Relative Pathnames
  •  File Names
  •  Copying Files and Directories
  •  Copying Files and Directories: The Destination
  •  Moving and Renaming Files and Directories
  •  Moving and Renaming Files and Directories: The Destination
  •  Removing and Creating Files
  •  Determining File Content
  •  Viewing an Entire Text File
  •  Viewing Files One Screenful at a Time
  •  Slocate
  •  Getting help: Man Pages
  • Module: The Bash Shell

  •  Objectives
  •  Agenda
  •  Bash Introduction
  •  Bash Heritage
  •  Command Line Shortcuts
  •  Command Line Expansion
  •  History Tricks
  •  Command Editing Tricks
  • Module: vi and vim Editor Basics and Printing

  •  Objectives
  •  Agenda
  •  Overview of vi and vim
  •  Starting vi and vim
  •  Three Modes of vi and vim
  •  Cursor Movement
  •  Entering Insert Mode
  •  Leaving Insert Mode:
  •  Change, Delete, and Yank
  •  Put (paste)
  •  Undoing Changes
  •  Searching for Text
  •  Saving and Exiting: ex mode
  •  A Few Tricks
  •  Printing in Linux
  •  Printing Commands
  •  Printing Utilities
  • Module: Configuring GNOME, KDE, and X-based Tools

  •  Objectives
  •  Agenda
  •  A Layered Vision of the x Window System
  •  Window Managers
  •  The GNOME Control Center
  •  The KDE Control Center
  •  The panel Application
  •  Configuring Nautilus
  •  Configuring gnome – terminal
  •  Saving Desktop Configuration Across Logins
  •  X-based Email Clients
  •  Configuring Evolution
  • Module: Advanced Topics in Users, Groups, and Permissions

  •  Objectives
  •  Agenda
  •  User and Group ID Numbers
  •  System Users and Groups
  •  Changing Your Identity
  •  User Information Commands
  •  Default File Permissions
  •  Special Permissions
  •  Special Permissions of Executable
  •  Special Permissions for Directories
  • Module: Standard I/O and Pipes

  •  Objectives
  •  Agenda
  •  Standard Input and Output
  •  Redirecting Input and Output
  •  Redirecting Output
  •  Redirecting Standard Output
  •  Redirecting Standard Output and Error
  •  Redirecting Input
  •  Using Pipes to Connect Processes
  •  Tee
  •  Piping into the Mail Command
  • Module: String Processing with Regular Expressions

  •  Objectives
  •  Agenda
  •  Pattern Matching with Regular Expressions
  •  Wildcard Characters
  •  Modifiers
  •  Anchors
  •  Regular Expressions – Examples
  •  Quote your regex’s!
  •  Grep
  •  Sed
  •  Using sed
  •  Less and slocate
  •  Egular Expressions in vi and vim
  •  Extended regex Syntax
  •  Awk
  •  Using awk
  • Module: bash Shell Scripting

  •  Objectives
  •  Agenda
  •  Scripting Basics
  •  Creating Shell Scripts
  •  Creating Shell Scripts Cont.
  •  Generating Output
  •  Handling Input
  •  Using Positional Parameters
  •  Using Functions in Shell Scripts
  •  Exit status
  •  Control Structures
  •  Conditional Execution
  •  Selection Structures: Using the if Statement
  •  File Tests
  •  String Tests
  •  Selection structures: Using if/else Statements
  •  Selection Structures: Using the case Statement
  •  Repetition Structures: The for loop
  •  Repetition Structures: The while loop
  •  Shell Script Debugging
  • Module: Programming and Administration

  •  Objectives
  •  Agenda
  •  Programming Tools
  •  Programming Languages
  •  Integrated Development Environment (IDE)
  • Module: Linux Filesystem Management

  •  Objectives
  •  Agenda
  •  System Initialization: Device Recognition
  •  Desk Partitioning
  •  Managing partitions
  •  Managing Data: Filesystem Basics
  •  Journaling for ext2 filesystems: ext3
  •  ReiserFS and JFS
  •  Managing Data: mount
  •  Managing Data: mount options
  •  ManManaging Data: /etc/fstab
  •  Managing Data: Unmounting Filesystems
  •  Managing Data: The Auto-Mounter
  •  Ext2/ext3 Filesystem Attributes
  •  Virtual Memory Files
  •  Filesystem Maintenance
  •  Determining Filesystem Usage
  •  Adding a Drive
  • Module: User Administration

  •  Objectives
  •  Agenda
  •  User Policy Considerations
  •  The User Account Database- /etc/passwd
  •  Adding a New User Account
  •  Modifying/Deleting Accounts
  •  Password Aging policies
  •  Authentication Configuration
  •  Group Administration
  •  Switching Accounts
  •  File Ownership
  •  Linux File Permissions
  •  SUID / SGID Executables
  •  The Sticky Bit
  •  The Setgid Access Mode
  •  Default File Permissions
  •  User Private Groups
  •  The Linux Quota System
  • Module: System Administration Tools

  •  Objectives
  •  Agenda
  •  Alternatives
  •  Using alternatives
  •  Print System User Interface
  •  CUPS Overview
  •  CUPS Configuration Files
  •  CUPS Queue management
  •  /etc/printcap and redhat-config-printer
  •  Task Automation
  •  Using at
  •  Controlling Access to at
  •  Using cron
  •  Crontab format
  •  System crontab Files
  •  Controlling Access to cron
  •  Using tmwatch
  •  System Log Configuration
  •  System Log Configuration (cont.)
  •  System Logging
  •  System Logging (cont.)
  •  Maintaining Logs
  •  Monitoring Logs
  •  Managing whatis
  •  System Mountoring and Process Control
  •  Backup To Tape
  •  Controlling Tape Drives
  •  Using tar
  •  Using dump/restore
  • Module: Kernel Services and Configuration

  •  Objectives
  •  Agenda
  •  Kernel Modules
  •  Kernel Module Configuration
  •  The /proc filesystem
  •  /proc/sys Configuration with sysct1
  •  Software RAID Configuration
  •  Software RAID Recovery
  •  Creating Logical Volumes
  •  Resizing Logical Volumes
  •  Logical Volume Snapshots
  • Module: Troubleshooting

  •  Objectives
  •  Agenda
  •  Troubleshooting
  •  Things to Check:X
  •  Things to Check: Services
  •  Things to Check: Networking
  •  Things to Check: Booting
  •  Filesystem Corruption
  •  Filesystem Recovery
  •  Recovery Run-levels
  •  Boot Floppies
  •  Rescue Environment
  •  Rescue Environment Utilities
  • Module: Organizing Network Systems

  •  Objectives
  •  Agenda
  •  Domain Name SystemDNS
  •  Zones, Domains & Delegation
  •  Name Server Hierarchy
  •  The DNS Server
  •  Berkeley Internet Name Domain (BIND)
  •  Service Profile: DNS
  •  Configuring BIND
  •  Global Options
  •  Address Match Lists and ac1
  •  Rndc
  •  Master and Slave Zones
  •  Reverse Lookup Zones
  •  Special Zones
  •  Zone Files
  •  Resource Records (RR)
  •  SOA (Start of Authority)
  •  NS (Name Server)
  •  Main Record Types
  •  Example Zone File
  •  Round Robin Load Sharing through DNS
  •  Delegating Subdomains
  •  BIND Syntax Utilities
  •  Caching-only Name Server
  •  >BIND Utilities
  •  Advanced BIND Features
  •  DHCP Overview
  •  Service Profile: DHCP
  •  Configuring a DHCP Server
  • Module: Electronic Mail Services

  •  Objectives
  •  Agenda
  •  Sendmail Features
  •  Security and “Anti-Spam” Features
  •  An Email Review
  •  Server Operations
  •  Service Profile: Sendmail
  •  Main Configuration Files
  •  Other Configuration Files
  •  Sendmail Configuration with the m4 Macro Language
  •  Sendmail m4 Macro File: Introduction
  •  Sendmail m4 Macro File: Features
  •  Sendmail Client Configuration
  •  Additional Sendmail Configuration Files
  •  Blacklisting Recipients
  •  Debugging Sendmail
  •  Postfix
  •  Service Profile:Postfix
  •  Additional Postfix Configuration
  •  Enhanced Postfix Configuration
  •  Procmail Delivery
  • Module: Security Concerns and Policy

  •  Objectives
  •  Agenda
  •  Definition of Security
  •  Attacks from the Network
  •  Principles of Security
  •  Security Practices
  •  Diagnostic Utilities
  •  Remote Service Detecting
  •  Isolate Vulnerabilities
  •  Security Policy: the System
  •  Security Policy: the People
  •  Response Strategies
  • Module: System Monitoring

  •  Objectives
  •  Introduction to System Monitoring
  •  File System Analysis
  •  Set User and Ground ID Permissions
  •  Typical Problematic Permissions
  •  EXT2 Filesystem Attributes
  •  System Log Files
  •  Syslogd and klogd configuration
  •  Advanced syslogd configuratio
  •  Log File Analysis
  •  Monitoring and Limiting Processes
  •  Processes Monitoring Utilities
  •  System Activity Reporting
  •  Process Accounting Tools
  • Module: Securing Services

  •  Objectives
  •  Agenda
  •  System Startup Control
  •  Securing the Service
  •  TCP-wrappers Configuration
  •  Daemon Specification
  •  Advanced Syntax
  •  Securing xinetd-managed services
  •  Host Patterns
  •  Advanced security Options
  • Module: Securing Data

  •  Objectives
  •  Agenda
  •  The Need for Encryption
  •  Cryptographic building Blocks
  •  Random Numbers
  •  One-Way Hashes
  •  Symmetric Encryption
  •  Asymmetric Encryption
  •  Public Key Infrastructures
  •  Digital Certificates
  •  Generating Digital Certificates
  •  OpenSSH Overview
  •  OpenSSH Authentication
  •  The OpenSSH Server
  •  Service Profile:SSH
  •  OpenSSH Server Configuration
  •  The OpenSSH Client
  •  Protecting Your Keys
  •  Applications: RPM

Why Efficient India ?

Our Trainers are having more than 3 years of experience in MNC Company.

Trained 50+ Students.

Well Equipped Computer Lab & Internet.

Interview Preparation & Technical Event.

Strong Practical & Theoretical Knowledge.

Corporate Exposure through Us.

100 % Job Assistance.