Technology Driven IT Training Longstanding IT Technologists Computer Education Techniques
Distance-learning - UNIX: System Administration

Home

distance-learning center

Distance-learning Distance-learning_Building

Professional Distance-learning

IT Training Services


UXSYS04

UNIX: System Administration
DURATION: 3 days

FEE: $1,485

PRIVATE GROUP FEE: $
Based upon a class size of six students.

Scheduling can be adjusted to employee work hours and incorporate client assignments.

SMALL CLASS SIZE:
There is a surcharge associated with training two or fewer students.

AUDIENCE:

  • Network Administrator
  • Support Personnel
  • Security Analyst
  • IT Professional
 
   

DATES:

CONTENT AND OBJECTIVES:
    1. Getting started
      • Examine the featureset and versions of Linux.
    2. User and Group Administration
      • Perform user administration.
      • Add new users and groups from the command-line and programmatically using scripts.
      • Turn on the quota system to limit user disk usage.
      • Modify the user's environment to set each individual user session and have a modified PATH.
    3. Administering Logins and Permissions
      • Create scripts to work with users.
      • Search all files for a specified user and modify its ownership.
      • Execute write and wall commands for contacting users.
      • Create a special file - pipe and determine its attributes.
      • Contact a user at login time.
    4. UNIX File System
      • Understand the file system and its structure.
      • Determine the file systems that are automatically mounted.
      • Change the attributes and options for a specified file system.
    5. Physical Disks
      • Recognize the partition system within UNIX.
      • Create a new partition and format a new file system.
      • Run the fsck utility to repair a file system.
    6. Disk Administration
      • Determine disk usage for each disk partition.
      • Use df and du for determining file usage and problem areas.
      • Create a logical volume using LVM.
    7. Operational States
      • Review the rc directories.
      • Create customized scripts at boot time.
      • Boot the system into single user and multi-user modes; list the system daemons that are running.
      • Modify kernel parameters, reboot the system, and ascertain the changes that have been made.
    8. Virtual Memory
      • Identify memory usage and abnormal memory utilization issues.
      • Use the vmstat utility to identify a problem area of memory.
    9. Network File Systems
      • Use the NFS server for several clients.
      • Setup a NFS server and clients.
      • Start and stop NFS.
    10. Process Management and Scheduling
      • Become knowledgeable with the UNIX process management and environment.
      • Determine the processing which is using the most resources.
      • Determine the resources that are being used.
    11. Backup and Recovery
      • Execute a full backup of the system.
      • Run an incremental backup of the system.
      • Restore the system to a specific point.
      • Backup all user home directories.
    12. Printing
      • Install a printer on a system.
      • Schedule print jobs and diagnose print problems.
    13. Network Applications
      • Utilize the FTP server as an administrator.
      • Start up the FTP server and determine which users can use the server and which are denied.
      • Setup the view of the individual users.

    Virtual Classroom   Blended Learning    

Synchronous
Instruction
Asynchronous
Instruction

Effective February 27, 2012, the course dates listed on the CETi schedules only will be available based upon approved and authorized user ID.

Copyright Acknowledgement: The software product(s) listed in this outline are owned and copyrighted by their respective companies. CETi makes no representation regarding ownership in any of the software products that we train on.

CETi courses are not intended for or open to the general public. They are intended for employees of Fortune 1000 companies, government municipalities, consulting companies, software, companies, healthcare providers. and mid-sized businesses. Individuals attending such courses will be required to execute a statement acknowledging that the employer will be paying for the CETi course and that the employer has a licensed version of the software.

Certain courses only should be taught by the source software company training company and open source purveyor.