UX003: UNIX System Administration

$3,060.00
$3,060.00
$3,060.00
Start Date Time Days Price GTR Availability
June 13, 2017 09:00 (EST) 4 $3,060.00 Register
September 18, 2017 09:00 (EST) 4 $3,060.00 Register
December 11, 2017 09:00 (EST) 4 $3,060.00 Register

Duration: 4 days

Summary
The course begins with administering user accounts and groups, then moves into file, file system, and disk management. Various archiving commands are shown along with backup strategies. Students will learn about process and job scheduling as well as startup and shutdown procedures. The course finishes with security, system tuning, and networking topics. Generic system administration concepts are covered and related to specific vendors’ systems.

Prerequisites

Course Content


1. Overview of System Administration

  • System Administrator Responsibilities
  • A Brief History of UNIX
  • Evolving Standards
  • Navigating the Documentation

2. User Administration

  • What is a “user” in UNIX?
  • The /etc/passwd File
  • Groups
  • The /etc/group File
  • Passwords
  • Adding Users
  • Deleting Users
  • Modifying User Attributes
  • The Login Process
  • /etc/profile and .profile
  • Communicating with Users: /etc/motd
  • Communicating with Users: The wall Command

3. File System Basics

  • The Hierarchy
  • Files
  • Directories
  • Device Files
  • Character and Block Devices
  • The/dev Directory
  • Links
  • Symbolic Links
  • A File System Tour
  • The df Command
  • The du Command
  • The find Command

4. Advanced File System Concepts

  • The Physical File System
  • The Inode File
  • File Storage in Disk Blocks
  • The Superblock
  • The Free List
  • Slices and File Systems
  • File System Types

5. Disk Management

  • Making a File System
  • The mkfs Command
  • Sharing File Systems
  • The mount Command
  • The fstab File
  • The fsck Command
  • The lost+found Directory
  • The prtvtoc Command

6. Backups

  • Backup Strategies
  • Backup Tools
  • The tar Command
  • The cpio Command
  • The dump Command
  • Network Backup Strategies

7. UNIX Processes

  • Overview of Processes
  • Process Space
  • Process Table
  • The fork/exec Mechanism
  • The ps Command
  • Background Processes
  • The kill Command
  • Scheduling Jobs
  • The cron Daemon
  • The at Command
  • The crontab Command
  • Format of cron Files
  • Access to Scheduling Facilities

8. System Startup and Shutdown

  • Run States
  • The init Daemon
  • /etc/inittab
  • The inittab Actions
  • The init Command
  • The rc Scripts
  • Single-User Mode
  • The shutdown Command

9. UNIX System Security

  • Security Overview
  • Physical Security
  • Account Security
  • SUID and SGID Settings
  • File and Directory Permissions
  • Software Security

10. Performance Monitoring and Tuning

  • Performance Issues
  • Methods of Improving Performance
  • Swapping and Paging
  • The sar Utility
  • Using sar
  • The truss Command

11. IP Addressing

  • Basic Network Needs
  • Ethernet Addresses
  • IP Addresses
  • DNS vs /etc/hosts to Resolve IP Addresses
  • Network Addresses
  • Network Classes
  • Broadcast Addresses
  • Subnet Masks

12. Configuring TCP/IP

  • The /etc/hosts File
  • The ifconfig Command
  • The /etc/services File
  • The inetd Daemon
  • The /etc/inetd.conf File
  • Simple TCP/IP Troubleshooting: The ping Command
  • Simple TCP/IP Troubleshooting: The nestat Command

13. The LP Print Service

  • Printing Overview
  • The lp Command
  • The lpstat Command
  • The cancel Command
  • Adding a Printer
  • The lpadmin Command
  • The accept and reject Commands
  • The enable and disable Commands
  • Adding a Networked Printer
  • Other Administrative Commands

14. Appendix A – Network Utilities

  • Network Services
  • telnet – Terminal Emulator
  • ftp – File Transfer
  • rcp – Remote Copy
  • rlogin – Remote Login
  • rsh – Remote Commands

15. Appendix B – Kernel Reconfiguration

  • Overview of Reconfiguration
  • Kernel Parameters
  • Steps to Reconfigure a Kernel
  • Specific Steps for SVR4

16. Appendix C – Overview of NIS

  • What is NIS?
  • Why Use NIS?
  • NIS Design and Implementation
  • NIS Maps
  • Configuring NIS