Securing and Networking Red Hat Linux

4 Day Course
Hands On
Code RHSANS

This course has been superseded by the Security for Red Hat Linux course.

Modules

Hide all

Network Configuration (11 topics)

  • Configuring Network Interfaces
  • Controlling Network Devices: ifup/ifdown
  • Configuring a NIS client
  • Resolution Order
  • Creating Virtual Interfaces
  • Using DHCP for Interfaces
  • Network tools mii-tool/ethtool
  • Routing IP Traffic under Red Hat Linux
  • Configuring the System as a Gateway
  • Configuring Network Time Protocol (NTP)
  • Network diagnosis tools : tcpdump, netstat, wireshark,etc.

Network Services (7 topics)

  • Ports and Socket Connections
  • The xinetd Daemon Operation
  • Controlling xinetd Services and Access
  • Controlling Services using Chkconfig
  • Limiting Access to Services using TCP Wrappers
  • Configuring DHCP Server
  • The FTP Service using vsftpd

Data Security (11 topics)

  • SELinux
  • Management of SELinux
  • Easy Configuration and Customisation of SELinux
  • Context Types
  • semanage, getsebool, setsebool and chcon commands
  • Data Security and Encryption Methods
  • Single Key Encryption (Symmetric)
  • Public/Private Key Encryption (Asymmetric)
  • Certificate Encryption and Digital Signatures
  • OpenSSH - ssh, scp and sftp commands
  • Client and Server Side Configuration of OpenSSH

The Domain Name System (10 topics)

  • The DNS/BIND system under Red Hat Linux
  • Name Server Hierarchy
  • Setting up DNS
  • Master/Slave Zones
  • Reverse lookup Zones
  • Record types and their syntax
  • Name Daemon Control Utility (rndc)
  • Address Match Lists (acl)
  • DNS in a chroot environment
  • BIND Checking Utilities

Network File System (NFS) (7 topics)

  • NFS Operation: daemons, portmapper etc.
  • Configuring an NFS Server
  • NFS Share Options: /etc/exports
  • UID Re-mapping
  • Configuring NFS Client Operation
  • Using the Automounter to Access NFS Mounts
  • SELinux implications

Samba Configuration (12 topics)

  • The SAMBA System
  • The SAMBA Services Provided
  • SAMBA Daemons and Operation
  • Configuring SAMBA: Various Tools Available
  • Testing Samba Configuration
  • SAMBA Authentication Methods
  • SAMBA Client Tools
  • USING smbmount to Access Windows Shares
  • Interrogating WINS servers using nmblookup
  • Using samba-swat
  • Using Konqueror to access Windows shares
  • Samba and SELinux

HTTP Services: Apache/Tux and Squid (9 topics)

  • The Apache and Tux Web Servers
  • Apache Server Configuration Files
  • Apache Configuration Directives
  • Virtual Host Management: Name and IP Based Access
  • CGI Programs and Apache Modules
  • HTTP and SELinux
  • The Squid Proxy Server
  • Configuring squid
  • Configuring Client Access to squid

Network Information System (NIS) (6 topics)

  • NIS Topology
  • Master, Slave and Client Configuration
  • Rebuilding NIS Maps
  • Handling home directories and Password Management under NIS
  • Password Management Under NIS
  • Troubleshooting your NIS Configuration

Electronic Mail (10 topics)

  • Email Components
  • Mail User, Mail Transport and Mail User Agents
  • Configuring sendmail and postfix
  • Sendmail Configuration Files
  • Sendmail Configuration with the m4 Macro Language
  • Macro Definitions
  • Switching to postfix, a sendmail replacement
  • Postfix Configuration
  • Procmail delivery agent
  • Dovecot - POP and IMAP services

Pluggable Authentication Module (PAM) (5 topics)

  • Authentication Services: PAM
  • PAM Operation
  • The Core PAM Configuration Files
  • Configuring Resource Limits and Access Control through PAM
  • PAM Examples

Securing Networks: Firewalls (10 topics)

  • Netfilter - iptables
  • IPV6 Overview
  • Packet Filtering Using iptables
  • Rule Targets
  • Basic Rules and their Operation
  • Connection Tracking
  • Network Address Translation
  • Debugging Route Problems
  • Source and Destination NAT Configuration
  • RedHat Supplied Tools for iptables Configuration

System Monitoring/Performance Management (7 topics)

  • System Log Files
  • Syslogd and klogd Configuration
  • Advanced syslogd Configuration
  • Analysing logfiles
  • System Performance Monitoring
  • System Activity Reporting
  • System Accounting

Installing Red Hat Linux Using Kickstart (6 topics)

  • How Kickstart Works
  • Sections within a Kickstart Configuration File
  • Pre and Post Kickstart Processing
  • Creating a Kickstart File
  • Creating the Linux Install Server
  • Differing ways of starting a Kickstart Installation

Prerequisites

The course assumes administration knowledge of the Red Hat Linux operating system to the level covered in the Administering Red Hat Linux course.

Additional Learning

The courses below may help you meet the knowledge level required to take this course. If you are unsure please ask a training advisor .

Course PDF

Print

Sections