Linux System & Network Administration ( Level 2)

by Datacom IT Institute Claim Listing

Linux System & Network Administration course is offered by Datacom IT Institute. Whether you are new to the computer industry or are looking to improve your skills and be an IT expert we have the right course for you.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Datacom IT Institute Logo

img Duration

3 Months

Course Details

Linux System & Network Administration course is offered by Datacom IT Institute. Whether you are new to the computer industry or are looking to improve your skills and be an IT expert we have the right course for you.

Well-qualified, experienced certified instructors train the participants with easy-to-use step-by-step training material in the most optimized period of time.

 

Syllabus:

  • Linux Essential
  • 1) Introduction
  • 2) Evolution of Linux
  • Linux Installation
  • Installation covers most flavors of Linux distribution such as Red hat Linux and Fedora Linux and Suse Linux
  • 1) First Stage: Starting the Installation
  • 2) First Stage: Boot Media
  • 3) Accessing the Installer
  • 4) First Stage: Installation Method
  • 5) Network Installation Server
  • 6) Second Stage: Installation Overview
  • 7) Configuring File Systems
  • 8) Advanced Partitioning
  • 9) Package Selection
  • 10) First Boot: Post-Install Configuration
  • 11) Starting a Kickstart Installation
  • 12) Anatomy of a Kickstart File
  • Linux System Administration – Managing Startup
  • Command line:
  • 1) Introduction to Bash Shell
  • 2) Basic Commands (ls,cd,tail,cat,mkdir)
  • 3) Commands to work with file(mv,cp,rm)
  • 4) Text editor (vim)
  • 5) Stream text editor (grep, sed, and awk)
  • 6) STDERR,STDOUT,STDIN
  • 7) Compression Tar,gzip and bzip2
  • 8) Easily accessible tools in linux.
  • System Initialization
  • 1) Boot Sequence Overview
  • 2) Troubleshooting boot issues
  • 3) What is GRUB and grub.conf
  • 4) Starting the Boot Process: GRUB
  • 5) Kernel Initialization
  • 6) init Initialization (init 0,1,2,3,4,5)
  • 7) Run Levels
  • 8) /etc/rc.d/rc.sysinit
  • 9) /etc/rc.d/rc
  • 10) System V run levels
  • 11) /etc/rc.d/rc.local
  • 12) Controlling Services(service,init.d,chkconfig)
  • Booting and run levels
  • 1) The boot process: from BIOS to kernel then to user space
  • 2) Setting kernel parameters
  • 3) Run levels and init scripts
  • 4) Configuring services to run at boot
  • 5) Securing single-user mode (su login)
  • 6) Shutting down and rebooting the system
  • Package Management – Working with packages>
  • 1) RPM Package Manager
  • 2) Installing and Removing Software
  • 3) Updating a Kernel RPM
  • 4) rpm Queries
  • 5) rpm Verification
  • 6) About yum
  • 7) Using yum
  • 8) Searching packages/files
  • 9) Configuring Additional Repositories
  • 10) Creating a private repository
  • 11) Red Hat Network
  • 12) Red Hat Network Server
  • 13) Entitlements
  • 14) Red Hat Network Client
  • Kernel Services – Configuring the kernel
  • 1) The Linux Kernel
  • 2) Kernel Images and Variants
  • 3) Kernel Modules
  • 4) Kernel Module Utilities
  • 5) Managing the initrd Image
  • 6) Accessing Drivers Through /dev
  • 7) Device Node Examples
  • 8) Managing /dev With udev
  • 9) Adding Files Under /dev
  • 10) Kernel Configuration With /proc
  • 11) /proc Examples
  • 12) sysctl : Persistent Kernel Configuration
  • 13) Exploring Hardware Devices (hwinfo)
  • 14) Monitoring Processes and Resources(kill,ps,pstree,top)
  • System Services – Linux System Services
  • 1) Network Time Protocol
  • 2) System Logging
  • 3) syslog Configuration
  • 4) XOrg: The X11 Server
  • 5) XOrg Server Configuration
  • 6) XOrg in runlevel 3
  • 7) XOrg in runlevel 5
  • 8) Remote X Sessions
  • 9) SSH: Secure Shell
  • 10) VNC: Virtual Network Computing
  • 11) cron
  • 12) Controlling Access to cron
  • 13) System crontab Files
  • 14) Daily Cron Jobs
  • 15) The anacron System
  • 16) CUPS
  • User Administration
  • 1) Adding a New User Account
  • 2) User Private Groups
  • 3) Modifying / Deleting User Accounts
  • 4) Group Administration
  • 5) Password Aging Policies
  • 6) Switching Accounts
  • 7) sudo
  • 8) Network Users
  • 9) Authentication Configuration
  • 10) Example: NIS Configuration
  • 11) Example: LDAP Configuration
  • 12) SUID and SGID Executables
  • 13) SGID Directories
  • 14) The Sticky Bit
  • 15) Default File Permissions
  • 16) Access Control Lists (ACLs)
  • 17) SELinux
  • 18) SELinux: Targeted Policy
  • 19) SELinux: Management
  • File system Management
  • 1) Adding New File systems to the File system Tree
  • 2) Device Recognition
  • 3) Disk Partitioning
  • 4) Managing Partitions
  • 5) Making Filesystems
  • 6) Difference between ext3 and ext4
  • 7) Filesystem Labels
  • 8) tune2fs
  • 9) Mount Points and /etc/fstab
  • 10) Mounting Filesystems with mount
  • 11) Unmounting Filesystems
  • 12) mount By Example
  • 13) Handling Swap Files and Partitions
  • 14) Mounting NFS Filesystems
  • 15) Automounter
  • 16) Direct Maps
  • 17) gnome-mount
  • 18) Checking available free space and space used by files (df,du)
  • 19) Checking and correcting the integrity of filesystems (fsck)
  • File system security
  • 1) Users and groups
  • 2) The ‘root’ user or superuser
  • 3) Changing file ownership (chown)
  • 4) Changing file group ownership (chgrp)
  • 5) Permissions on files
  • 6) Permissions on directories
  • Guwahati Branch

    GMC Hospital Rd, opposite Shiv Temple, Guwahati

© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy