RHCA Syllabus
RHCA Syllabus
RHCA Syllabus
Enabling the SNMP agent Profiling SNMP host access controls Configuring SNMP v1 access Configuring SNMP v3 access Beyond RH442: Extending snmpd
Queue length vs wait time Wait time A closer look at wait time How much user time is needed? Profiling time with time Finding hot spots in code Completion rate Arrival rate vs completion rate Finding a valid observation period Predicting system-wide limits Predicting resource limits Summary of strategies
Filesystem limits Journaling Improving journal performance Tuning journal placement Other mount-time options Finding lock contention Reducing visit count with RAID Calculating chunk size Calculating filesystem stride Tuning round-robin RAID Write overhead for RAID5 and RAID6 Improving RAID1 performance Tuning RAID1 Tuning RAID in SysFS
Configuring the root cpuset Configuring a child cpuset Important files for scheduler domains Virtual CPUs Tuning VCPUs at domain creation Tuning VCPUs dynamically Tuning VCPU affinity
SysV IPC Tuning SysV IPC Viewing memory with free Other commands to view memory usage
Hierarchical Resource Ordering High Availability Services Global File System (GFS) Implementation and Configuration Lock Management Planning For and Growing On-line GFS Monitoring Tools Journal Configuration and Management
Network-managed users and account management RPC and NIS security issues Improving NIS security Using Kerberos authentication Debugging Kerberized Services Kerberos Cross-Realm Trust Kerberos Encryption Network File System Overview of NFS versions 2, 3, and 4 Security in NFS versions 2 and 3 Improvements in security in NFS4 Troubleshooting NFS4 Client-side mount options OpenSSH Vulnerabilities Server configuration and the SSH protocols Authentication and access control Client-side security Protecting private keys Port-forwarding and X11-forwarding issues Electronic Mail with Sendmail Vulnerabilities Server topologies Email encryption Access control and STARTTLS Anti-spam mechanisms Postfix Vulnerabilities Security and Postfix design Anti-spam mechanisms Configuring SASL/TLS FTP Vulnerabilities The FTP protocol and FTP servers Logging Anonymous FTP Access control Apache security ipsr solutions ltd
Vulnerabilities Access control Authentication: files, passwords, Kerberos Security implications of common configuration options CGI security Server side includes suEXEC Intrusion Detection and Recovery Intrusion risks Security policy Detecting possible intrusions Monitoring network traffic and open ports Detecting modified files Investigating and verifying detected intrusions Recovering from, reporting, and documenting intrusions
RH401 Red Hat Enterprise Deployment and Systems Management Course Outline
Unit 1 - Essential System Management Goals of Enterprise system management Standardization, centralization, and scalability Provisioning and automation Unit 2 - Installing a Red Hat Network Satellite Server Introduction to RHN Satellite - features, prerequisites Installing Satellite Server software Understanding software channels and entitlements Importing channel content into a Satellite Server Unit 3 - Red Hat Network Organization Organization management and trust relationships Managing user accounts Assigning user roles (security) Managing system groups
Unit 4 - Managing Changes with Revision Control Introducing revision control concepts Basic Subversion repository administration RHCA Course Syllabus ipsr solutions ltd
Using Subversion to manage revisions Unit 5 - Red Hat Network Client Configuration Secure communication with SSL Red Hat Network registration Creating and using activation keys Registration automation with bootstrap.sh Troubleshooting RHN registration Unit 6 - Red Hat Network Software Management Software channel relationships Cloning existing software channels Managing custom software channels Notifying clients of changes: managing errata Unit 7 - Building RPMs Building open source software Using RPM macros Writing custom spec files Using rpmbuild to create RPMs Signing packages for security Unit 8 - RHN Application Programmer Interface Uses for Red Hat Network API Basic RHN API program structure Sample programs Unit 9 - Configuration File Management with Red Hat Network Managing configuration channels Configuration file macros Configuration file management using command-line tools Unit 10 - Provisioning with Kickstart Anaconda kickstart options Building a provisioning environment Using Cobbler for provisioning
Unit 11 - Virtual Machine Management RHCA Course Syllabus ipsr solutions ltd
Virtual host/virtual platform entitlements Controlling Xen guests using RHN Red Hat Network management of Xen virtual machines Unit 12 - RHN Satellite Server Administration High-availability options Embedded database management Certificate management Changing from disconnected to connected operation Inter-satellite synchronization (ISS) Exporting software channels Troubleshooting Unit 13 - Red Hat Network Proxy Server RHN proxy server installation Configuring a client to use a RHN proxy server Managing software with RHN package manager
Search filter syntax Updating the directory Red Hat Directory Server: Authentication and Security Configuring TLS security Using access control instructions (ACI's) ACI's and the Red Hat Console Linux User Authentication with NSS and PAM Understanding authentication and authorization Name service switch (NSS) Advanced pluggable authentication modules (PAM) configuration Centralized User Authentication with LDAP Central account management with LDAP Using migration scripts to migrate existing data into an LDAP server LDAP user authentication Kerberos and LDAP Introduction to Kerberos Configuring the Kerberos key distribution center (KDC) and clients Configuring LDAP to support Kerberos Directory Referrals and Replication Referrals and replication Single master configuration Multiple master configuration Planning for directory server availability Cross-Platform Centralized Identity Management Synchronizing Red Hat Directory Server with Active Directory Managing users with Winbind and LDAP Mapping attributes between Linux and Windows