Différences

Ci-dessous, les différences entre deux révisions de la page.

Lien vers cette vue comparative

Prochaine révision
Révision précédente
elearning:workbooks:rh124 [2024/05/16 12:10] – created adminelearning:workbooks:rh124 [2024/05/16 12:16] (Version actuelle) admin
Ligne 191: Ligne 191:
       * LAB #1 - Start-up Scripts       * LAB #1 - Start-up Scripts
  
 +  * **LCE501 - Managing Users and Groups**
 +    * Presentation
 +      * /etc/nsswitch.conf
 +      * The getent Command
 +      * The /etc/group and /etc/gshadow files
 +      * The /etc/passwd and /etc/shadow files
 +    * Commands
 +      * Groups
 +        * groupadd
 +        * groupdel
 +        * groupmod
 +        * newgrp
 +        * gpasswd
 +      * Users
 +        * useradd
 +        * userdel
 +        * usermod
 +        * passwd
 +        * chage
 +    * Configuration
 +    * LAB #1 - Managing Users and Groups
 +    * LAB #2 - su and su -
 +    * sudo
 +
 +  * **LCE502 - Package Management**
 +    * LAB #1 - Compiling Software
 +      * 1.1 - ./configure
 +      * 1.2 - make
 +      * 1.3 - make check
 +      * 1.4 - make install
 +    * LAB #2 - The rpm Command
 +      * 2.1 - Configuration
 +      * 2.2 - Usage
 +    * LAB #3 - The dnf Command
 +      * 3.1 - Presentation
 +      * 3.2 - Configuration
 +      * 3.3 - Repositories
 +      * 3.4 - Searching for Packages
 +      * 3.5 - Viewing Information on and Downloading a Package
 +      * 3.6 - Installing a Package
 +      * 3.7 - Updating Packages
 +      * 3.8 - Deleting Packages
 +    * Shared Libraries
 +      * Presentation
 +        * Introduction
 +        * Shared Object Locations
 +        * ld-linux.so.2
 +      * The ldd Command
 +      * The /etc/ld.so.conf File
 +      * The ldconfig Command
 +
 +  * **LCE503 - Managing File Permissions**
 +    * Presentation
 +    * Preparation
 +    * LAB #1 - Basic Unix File Permissions
 +      * 1.1 - Changing Permissions with chmod
 +        * Symbolic Mode
 +        * Octal Mode
 +        * The umask Command
 +      * 1.2 - Changing the Owner or the Group with chown and chgrp
 +        * The chown Command
 +        * The chgrp Command
 +    * LAB #2 - Advanced Unix Permissions
 +      * 2.1 - SUID/SGID bit
 +      * 2.2 - Inheritance Flag
 +      * 2.3 - Sticky bit
 +    * LAB #3 - Extending Linux Permissions using ACLs and Attributes
 +      * 3.1 - ACLs
 +      * 3.2 - Attributes
 +
 +  * **LCE505 - Process Scheduling**
 +    * cron
 +      * The /etc/crontab file
 +      * Time Fields
 +      * User Crontabs
 +    * anacron
 +    * at
 +
 +  * **LCE507 - Process Management**
 +    * Presentation
 +    * Process Types
 +    * Process Commands
 +      * The ps Command
 +      * The pgrep Command
 +      * The pstree Command
 +      * The top Command
 +      * The fg, bg and jobs Commands
 +      * The wait Command
 +      * The nice Command
 +      * The renice Command
 +      * The nohup Command
 +      * The kill Command
 +      * The pkill Command
 +
 +  * **LCE508 - Managing Logs**
 +    * Presentation
 +    * The dmesg Command
 +    * Security Logging
 +      * The last Command
 +      * The lastlog Command
 +      * The lastb Command
 +      * The /var/log/secure File
 +    * The /var/log/audit/audit.log File
 +      * Managing Audit Events
 +        * auditd
 +        * auditctl
 +      * Viewing Audit Events
 +        * The aureport Command
 +        * The ausearch Command
 +    * The /var/log/messages File
 +    * Applications
 +    * rsyslog
 +      * Priorities
 +      * Facilitiess
 +      * The /etc/rsyslog.conf File
 +        * Modules
 +        * Global Directives
 +        * Rules
 +          * Facility.Priority
 +          * Facility!Priority
 +          * Facility=Priority
 +          * Using the * Wildcard
 +          * n Facilities with Identical Priorities
 +          * n Selectors with Identical Actions
 +    * The logger Command
 +    * The logrotate Command
 +    * journald
 +      * Using Journald
 +        * Application Specific Messages
 +        * Boot Messages
 +        * Priority Specific Messages
 +        * Messages from a Specific Date Range
 +        * Real Time Messages
 +        * Searching with Key Words
 +
 +  * **LCE510 - System Startup and Shutdown**
 +    * System Startup
 +      * Boot Loader
 +        * BIOS Systems
 +        * EFI Systems
 +        * GRUB 2
 +          * The /boot/grub/grub.cfg File
 +          * The /etc/default/grub file
 +          * Files in the /etc/grub.d directory
 +      * Initramfs
 +        * The init Script 
 +      * Kernel Booting Process
 +    * Systemd
 +      * LAB #1 - The systemctl Command
 +      * LAB #2 - Configuration Files
 +        * 2.1 - Default Configuration Files
 +        * 2.1 - Overloading Default Configuration Files
 +      * LAB #3 - The systemd-analyze Command
 +      * LAB #4 - Targets
 +        * 4.1 - Checking the Target Dependencies
 +        * 4.2 - The Default Target
 +          * Checking the Default Target
 +          * Changing the Default Target
 +          * Changing the Default Target for the Current Session
 +      * LAB #5 - Managing Services
 +        * 5.1 - Single Service Instances
 +        * 5.2 - Multiple Instance Services
 +        * 5.3 - Disallowing Modifications to a Service Status
 +    * LAB #6 - System Shutdown
 +      * 6.1 - The shutdown Command
 +      * 6.2 - The reboot Command
 +      * 6.3 - The halt Command
 +      * 6.4 - The poweroff Command
 +
 +  * **LCE603 - Managing the Network**
 +    * Presentation
 +      * The nmcli Command
 +    * LAB #1 - Configuring the Network
 +      * 1.1 - Connections and Profils
 +      * 1.2 - Name Resolution 
 +      * 1.3 - Adding a Second IP Address to a Profile
 +      * 1.4 - The hostname Command
 +      * 1.5 - The ip Command
 +      * 1.6 - Manually Activating and Disactivating a Device
 +      * 1.7 - Static Routing
 +        * The ip Command
 +        * Disactivating/Activating Internal Routing on a Server
 +    * LAB #2 - Diagnostics
 +      * 2.1 - The ping Command
 +      * 2.2 - The netstat Command
 +      * 2.3 - The traceroute Command
 +    * LAB #3 - SSH
 +      * 3.1 - Presentation
 +        * SSH-1
 +        * SSH-2
 +      * 3.2 - Configuring the Server
 +      * 3.3 - Configuring the Client
 +      * 3.4 - SCP
 +        * Presentation
 +        * Usage
 +      * 3.5 - Authentication with Asymetric Keys
 +
 +-----
 +Copyright © 2024 Hugh Norris - Non-contractual document. The Training Program may be modified without notice.
  
Menu