Securing and Networking Red Hat Linux
Prerequisites:
Delegates should have attended Using Red Hat Linux, or have similar skills and experience.Course Description:
On completion of the course the delegate will have be able to administer complex Red Hat Linux networks and protect them from attack. They will have a greater technical awareness of the skills required to monitor and control performance issues. They will also gain the key skills required to work towards achieving the Red Hat Certified Engineer (RHCE) certification status.
Delegates:
System Administrators and Programmers who need to acquire knowledge of the key tasks required to Network and secure Red Hat Linux systems. Delegates looking to achieve the Red Hat Certified Eng…
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
Prerequisites:
Delegates should have attended Using Red Hat Linux, or have similar skills and experience.Course Description:
On completion of the course the delegate will have be able to administer complex Red Hat Linux networks and protect them from attack. They will have a greater technical awareness of the skills required to monitor and control performance issues. They will also gain the key skills required to work towards achieving the Red Hat Certified Engineer (RHCE) certification status.
Delegates:
System Administrators and Programmers who need to acquire knowledge
of the key tasks required to Network and secure Red Hat Linux
systems. Delegates looking to achieve the Red Hat Certified
Engineer (RHCE) certification status.
This course includes the following modules:
Topics Covered:
- Network Device Configuration and Control
- DHCP Server and Client Configuration
- Route IP Traffic
- Control Network Services using xinetd
- Configure Secure FTP
- Log and Diagnose Network Problems
- Configure DNS Servers/Clients
- Troubleshoot DNS Configurations
- Share Data using NFS and Samba
- Configure HTTP Services using the Apache Web Server
- Configure a Proxy Server using Squid
- Configure Network Integration Service (NIS)
- Switch between and use sendmail/postfix for Electronic Mail
- Configure Security and Authentication Systems using PAM
- Secure a System against Attack by Configuring a Firewall
- Configure Source and Destination Network Address Translation
- Secure Data using Various Encryption Facilities
- Configure OpenSSH for Secure Access
- Configure syslogd for Advanced Logging
- Investigate Performance Issues
- Configure Basic System Auditing
For online live training advice please visit our Learning Advice Centre on our website. Be sure to follow us on Twitter to receive special course offers, news and updates!
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
