LINUX7 Enterprise operation and maintenance high-end Training video tutorial

Source: Internet
Author: User
Tags file copy ldap system log scp command secure copy

The first LINUX7 enterprise-level advanced training course in China (Linux7 system, Service hardening security, virtualization and cloud computing)
Course Lecturer: Learned Gold Instructor Course Category: Set series
Suitable for people: intermediate
Number of lessons: 220 hours
Update degree: 80%
Using technology: Linux systems, Service hardening security, enterprise and cloud computing, RH255 and RHS333
Projects covered: Linux systems, Service Hardening security, virtualization, and cloud computing
Consulting qq:1840215592
Course Features
The first high-end operation and maintenance training course of Linux7 system in China, June 11, 2014, linux7,2014 October 7, official Instructor Training certification, October 29, 2014 We launch this set of high-end courses.
The intermediate part of this course is focused on the new enterprise-class RHEL7 platform, revealing the new features of RHEL7, allowing you to learn from strangeness to familiarity and mastery, including the latest technology cloud OpenStack, virtualization Rhev, VSphere, and system security hardening SELinux, class to the project-oriented, with a clear outline and knowledge framework to organize, not a large number of common books of text, in the "skeleton" clear and complete case, the explanation part is mainly by the teacher to complete, so that the study efficiency is the highest.
Learning Goals
Students can master Linux beginner, intermediate, and advanced skills through video teaching. Enterprise-level operational Linux is a service security, system security hardening, enterprise-level enterprise and cloud computing are the most important enterprises, but also the most extensive enterprise talent needs. The main goal of this set of video is first familiar with the use of Linux operating system in enterprise, strengthen the students ' understanding and application of security hardening, virtualization, cloud Computing in Linux, and grasp the deployment of system security, virtualization and cloud computing in enterprise, through the analysis example of typical application scenario, So that students can master the above knowledge.


LINUX7 Enterprise operation and maintenance high-end training course View MORE: http://www.ibeifeng.com/bxlinux.html
Course Audience
1. In-school students or graduating students, interested in working in Linux operations
2. Interested in computer hardware and software system related work, and hope to engage in the system operation and maintenance management related work of non-professional IT technical personnel
3. Personnel who are already engaged in system operations, but lack knowledge or desire to fully enhance their capacity in the field
Course Outline:
First, Red hat system Management I classroom environment introduction
1. Access the command line
1.1. Using the command line tool through the local console
1.2. Local Console access Terminology
1.3. Using the desktop to access the command line
1.4. GNOME Desktop Environment Practice
1.5. Execute commands using bash shell
1.6. Bash Command Tips
2. Using the command line to manage files
2.1. Linux File System architecture
2.2. Introduction of common Catalogue
2.3. Using command line tools to manage files
2.4. Use of wildcard characters under command line
2.5. Managing file and Shell extensions
3. Get help under Red Hat Enterprise Linux
3.1, man command use skills
3.2, pinfo command use Tips
3.3, use the system to bring the help/usr/share/doc
3.4. Use Red Hat official help
3.5. Use of SOS Report Tool
4. Create, view, and edit text files,
4.1, the Linux standard input, output
4.2. I/O redirection and use of pipelines
4.3. vim file editing and Advanced technique introduction
4.4. Use graphical editing of text files
5. Manage Local Users and groups
5.1. Introduction of Local Users and groups
5.2. Introduction to sudo advanced techniques
5.3. Manage local user accounts
5.4. Create a local user using the command line tool
5.5. Manage local group accounts
5.6. Manage local User passwords
6. Introduction to Linux Local System file permissions
6.1. Linux File system permissions
6.2. Introduction to Permissions for files and directories
6.3. Manage file system permissions using the command line
6.4. Manage Default Permissions
6.5, special permission to use
7. Monitoring and managing Linux processes
7.1. What is a process?
7.2. Introduction of Process Status
7.3. Viewing system processes
7.4. Manage Background jobs
7.5. Process Management
7.6. View locally logged-on users
7.7. Status of monitoring system
8, Management system services
8.1. View the services that the system is already running
8.2, Systemctl Tool Introduction
9. Configure OpenSSH Service
9.1, OpenSSH Introduction
9.2, based on SSH Key configuring authentication
9.3. SSH Advanced Configuration
10. Log Analysis and Storage
10.1, System Log schema Introduction
10.2. Detailed Log configuration file
10.3. log file monitoring
10.4, Journalctl Command detailed
11. Managing Red Hat Enterprise Linux network management
11.1, the concept of the network
11.2. Linux Network configuration
11.3, nmcli command line Introduction
11.4. Edit the network configuration file
11.5. Host name configuration and DNS client configuration
12. Archive and inter-system file copy
12.1. Using tar to manage files
12.2. View and recover files from tar files
12.3. Secure copy files from different Linux systems
12.4, the SCP command detailed
12.5, rsync command detailed
13. Install and update packages
13.1. Use Red Hat subscription to manage software
13.2. Automatic registration of Red Hat system to the portal
13.3, rpm command detailed
13.4. The Yum tool detailed
13.5, the creation of the Yum Library
14. linux File system access
14.1. File system and equipment identification
14.2. Installing and canceling mounted file systems
14.3, DF and du command detailed
14.4. Soft links and hard links
15. Use of virtualized systems
15.1. Manage local Virtual hosts
15.2. Install a new virtual machine
Second, Red hat System Management II classroom environment Introduction
1, automatic system installation and start-up
1.1, Kickstart principle detailed
1.2, Kickstart configuration file detailed
1.3. Deploy a new virtual system through the Kickstart corner
1.4. PXE
2. Use of regular expressions
2.1, the basic introduction of regular expressions
2.2, grep detailed
2.3. grep and log system combination
3. Vim Editor Detailed
3.1. Vim Text editor detailed
3.2, the VIM editor three modes of introduction
3.3, the Vim editor Advanced Technique explanation
4, crontab Planning task detailed
4.1, crontab Grammar explanation
4.2. crontab Scheduled Task creation
4.3, the system default planning task detailed
4.4. Manage Temporary documents
5. Linux process management and process prioritization
5.1. Process priorities and the concept of "nice"
5.2. Change process priority using nice and Renice
5.3. Detailed process Strategy
6. Access Control List (ACL)
6.1. Interpreting ACLs
6.2. ACL and file system relationships
6.3. Detailed ACL
7. SELinux Security Management
7.1. SELinux Introduction
7.2, the selinux mode switch
7.3. SELinux Context Switching
7.4, SELinux boolean value of the switch
7.5, SELinux detailed
7.6. SELinux Troubleshooting
8. Configure network users and Groups
8.1, Identity Management Services detailed
8.2. Connect to a central server LDAP and Kerberos
8.3, LDAP detailed
8.4. A detailed description of the Kerberos principle
9. Adding disks, partitions, and file systems on Linux systems
9.1. Adding partitions and file systems
9.2. Manage Swap partitions
10. Managing Logical Volume Management (LVM) storage
10.1. The concept of logical volume management
10.2. Logical Volume explanation
10.3. Extending the physical volume
10.4. Extended Volume Group
10.5. Extending the logical Volume
11. Network File System (NFS) access to networked storage
11.1. Install Network Storage NFS
11.2, the Principle of NFS detailed
11.3, Nfs-server
12. SMB Access to networked storage
12.1. SMB Access to networked storage
12.2, SMB principle detailed
12.3, Samba-server
13. Control and troubleshooting the boot process for Red Hat Enterprise Linux
13.1. Boot process for Red Hat Enterprise Linux
13.2. Startup Repair FAQ
13.3. Reset Root Password
13.4. fix file system problems
14. FIREWALLD Restricting service access
14.1, FIREWALLD limit network communication
14.2, Firewalld principle detailed
Three, Red hat System Management III classroom environment Introduction
1. Control services and background processes
1.1. Control Systemctl Service
1.2. Control Service boot Process
2, the management of the IPV6 network
2.1, review the network configuration of IPV4
2.2. Configure IPV4 Network
2.3, IPV6 's network concept
2.4. Interpreting IPV6 Address
2.5, IPV6 Network configuration
3. Configure link Aggregation and bridging
3.1. Configure channel Bindings
3.2. Configure Link Aggregation
3.3. Configure Network bridging
4. Network Port Security
4.1. Management Firewalld
4.2. Configure the Firewall
4.3. Write a custom rule
4.4. Camouflage and Port forwarding
4.5. Add custom FIREWALLD areas and services
4.6, manage the SELinux port
5. Configure e-mail transmission
5.1. Email overview
5.2. Configure send-only email configuration
5.3. Junk mail and filtering
6. iSCSI Storage Server Setup
6.1, the concept of iSCSI
6.2. iSCSI Server Setup
6.3. iSCSI Client Configuration
7. Configuring the MARIADB Database
7.1, Installation mariadb

7.2. Manage database users and access rights
7.3. Create and restore MARIADB backups
7.4. Configuring the MARIADB Database
8. Build Apache Web Service
8.1. Configure Apache HTTPD
8.2. Configuring and Troubleshooting Virtual Hosts
8.3. Configuring HTTPS
8.4. Configuring Dynamic Web Content
9. Create a bash script
9.1. Bash Shell Script Introduction
9.2. Bash Shell Script detailed
10. Shell conditional statements and control structures
10.1. Enhanced bash shell scripts and conditional statements and control structures
Iv. Cloud Computing/Virtualization Topics
1, Red Hat Enterprise Linux OpenStack Platform architecture introduction;
2, Red Hat Enterprise Linux OpenStack Platform installation;
3, message middleware;
4, identity services;
5, object storage services;
6, mirror service block storage services;
7, network services computing and control services;
8, compute node;
9, control services;
10, Red Hat Enterprise Linux OpenStack Platform roadmap, etc.;
11, RHEV Introduction Detailed:
(1) Introduction of virtualization;
(2) rhev-m management end;
(3) Rhev-h operator;
(4) The configuration of the virtualized environment;
(5) Server virtual machine installation;
(6) Desktop virtual installation;
(7) Create a template;
(8) Pool and user rights assignment;
(9) Virtual machine monitoring;
(ten) RHEVM Backup and recovery.

LINUX7 Enterprise operation and maintenance high-end Training video tutorial

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.