• Programming Training

    business_appsInterSource offers live instructor-led courses on all important programming technologies, including C#, C/C#, PHP and Visual Basic. We can also arrange training on many less-known but highly useful languages. We can teach courses on a variety of additional topics; please request an offer if you need a course which is not indicated on the site.

    These live classes are offered both on client sites, at our Geneva training center, and via a Web interface.

  • About Programming

    Within software engineering, programming (the implementation) is regarded as one phase in a software development process, normally following closely on the heels of the requirements gathering phase.

    Computer programming (often shortened to programming or coding) is the process of writing, testing, debugging/troubleshooting, and maintaining the source code of computer programs. This source code is written in a programming language. The code may be a modification of an existing source or something completely new. The purpose of programming is to create a program that exhibits a certain desired behavior (customization). The process of writing source code often requires expertise in many different subjects, including knowledge of the application domain, specialized algorithms and formal logic.

    Read More
  • Course Details Programming

    Classes are offered at client sites, at our Geneva training center, and via a live web conference. For detailed course outlines and scheduled classes, please see below.

    To book training, navigate to the course you need, then:

    • For scheduled online classes, register from the choices indicated.
    • If you need an alternative date, time or location, or if you want a live classroom course, click on “request an offer for this course,” to complete the form.

Enterprise Linux Systems Administration Training

Course duration

  • 5 days

Course Benefits

  • Installation and configuration
  • The boot process
  • User and group administration
  • Filesystem administration, including quotas, FACLs, RAID and LVM
  • Task automation
  • client networking
  • SELinux
  • Software management
  • Log files
  • Troubleshooting

Course Outline

  1. Linux Kernel & Devices
    1. Hardware Discovery Tools
    2. Configuring New Hardware with hwinfo
    3. Kernel Hardware Info – /sys/
    4. /sys/ Structure
    5. udev
    6. Managing Linux Device Files
    7. List Block Devices
    8. SCSI Devices
    9. USB Devices
    10. USB Architecture
    11. Kernel Modules
    12. Configuring Kernel Components and Modules
    13. Handling Module Dependencies
    14. Configuring the Kernel via /proc/
    15. Console
    16. Virtual Terminals
    17. Keyboard & locale configuration
    18. Serial Ports
    19. Random Numbers and /dev/random
    20. Lab Tasks
      1. Adjusting Kernel Options
      2. Linux Kernel Driver Compilation
      3. Introduction to Troubleshooting Labs
      4. Troubleshooting Practice: Kernel Modules
  2. Systemd Overview
    1. System Boot Method Overview
    2. systemd System and Service Manager
    3. Modifying systemd services
    4. Systemd Service Sandboxing Features
    5. systemd Targets
    6. Using systemd
    7. Linux Runlevels Aliases
    8. Legacy Support for SysV init
    9. Lab Tasks
      1. Managing Services With Systemd's systemctl
      2. Creating a systemd unit file
  3. GRUB2/Systemd Boot Process
    1. Booting Linux on PCs
    2. GRUB 2
    3. GRUB 2 Configuration
    4. GRUB 2 Security
    5. Boot Parameters
    6. Initial RAM Filesystem
    7. init
    8. Systemd local-fs.target and sysinit.target
    9. Systemd basic.target and multi-user.target
    10. Legacy local bootup script support
    11. System Configuration Files
    12. RHEL7 Configuration Utilities
    13. SLES12 Configuration Utilities
    14. Shutdown and Reboot
    15. Lab Tasks
      1. Boot Process
      2. Booting directly to a bash shell
      3. GRUB Command Line
      4. Basic GRUB Security
      5. Troubleshooting Practice: Boot Process
  4. Software Maintenance
    1. Managing Software
    2. RPM Features
    3. RPM Architecture
    4. RPM Package Files
    5. Working With RPMs
    6. Querying and Verifying with RPM
    7. Updating the Kernel RPM
    8. Dealing With RPM & Yum Digest Changes
    9. Yum Plugins & RHN Subscription Manager
    10. YUM Repositories
    11. YUM Repository Groups
    12. Compiling/Installing from Source
    13. Manually Installed Shared Libraries
    14. Rebuilding Source RPM Packages
    15. Lab Tasks
      1. Managing Software with RPM
      2. Creating a Custom RPM Repository
      3. Querying the RPM Database
      4. Installing Software via RPM & Source and Rebuilding SRPMs
      5. Troubleshooting Practice: Package Management
  5. Local Storage Administration
    1. Partitioning Disks with fdisk & gdisk
    2. Resizing a GPT Partition with gdisk
    3. Partitioning Disks with parted
    4. Non-Interactive Disk Partitioning with sfdisk
    5. Filesystem Creation
    6. Persistent Block Devices
    7. Mounting Filesystems
    8. Resizing Filesystems
    9. Filesystem Maintenance
    10. Managing an XFS Filesystem
    11. Swap
    12. Filesystem Structures
    13. Determining Disk Usage With df and du
    14. Configuring Disk Quotas
    15. Setting Quotas
    16. Viewing and Monitoring Quotas
    17. Filesystem Attributes
    18. Lab Tasks
      1. Creating and Managing Filesystems
      2. Hot Adding Swap
      3. Setting User Quotas
  6. LVM & RAID
    1. Logical Volume Management
    2. Implementing LVM
    3. Creating Logical Volumes
    4. Activating LVM VGs
    5. Exporting and Importing a VG
    6. Examining LVM Components
    7. Changing LVM Components
    8. Advanced LVM Overview
    9. Advanced LVM: Components & Object Tags
    10. Advanced LVM: Automated Storage Tiering
    11. Advanced LVM: Thin Provisioning
    12. Advanced LVM: Striping & Mirroring
    13. Advanced LVM: RAID Volumes
    14. SLES Graphical Disk Tool
    15. RAID Concepts
    16. Array Creation with mdadm
    17. Software RAID Monitoring
    18. Software RAID Control and Display
    19. Lab Tasks
      1. Creating and Managing LVM Volumes
      2. Creating LVM Thin Volumes
      3. Troubleshooting Practice: LVM
      4. Creating and Managing a RAID-5 Array
  7. Remote Storage Administration
    1. Remote Storage Overview
    2. Remote Filesystem Protocols
    3. Remote Block Device Protocols
    4. File Sharing via NFS
    5. NFSv4+
    6. NFS Clients
    7. NFS Server Configuration
    8. YaST NFS Server Administration
    9. Implementing NFSv4
    10. AutoFS
    11. AutoFS Configuration
    12. Accessing Windows/Samba Shares from Linux
    13. SAN Multipathing
    14. Multipath Configuration
    15. Multipathing Best Practices
    16. iSCSI Architecture
    17. Open-iSCSI Initiator Implementation
    18. iSCSI Initiator Discovery
    19. iSCSI Initiator Node Administration
    20. Mounting iSCSI Targets at Boot
    21. iSCSI Multipathing Considerations
    22. Lab Tasks
      1. Using autofs
      2. NFS Server Configuration
      3. iSCSI Initiator Configuration
      4. Multipathing with iSCSI
  8. User/Group Administration
    1. Approaches to Storing User Accounts
    2. User and Group Concepts
    3. User Administration
    4. Modifying Accounts
    5. Group Administration
    6. Password Aging
    7. Default User Files
    8. Controlling Login Sessions
    9. RHEL DS Client Configuration
    10. SLES DS Client Configuration
    11. System Security Services Daemon (SSSD)
    12. Lab Tasks
      1. User and Group Administration
      2. Using LDAP for Centralized User Accounts
      3. Troubleshooting Practice: Account Management
  9. Pluggable Authentication Modules (PAM)
    1. PAM Overview
    2. PAM Module Types
    3. PAM Order of Processing
    4. PAM Control Statements
    5. PAM Modules
    6. pam_unix
    7. pam_nologin.so
    8. pam_limits.so
    9. pam_wheel.so
    10. pam_xauth.so
    11. Lab Tasks
      1. Restricting superuser access to wheel group membership
      2. Using pam_nologin to Restrict Logins
      3. Setting Limits with the pam_limits Modules
      4. Using pam_limits to Restrict Simultaneous Logins
  10. Security Administration
    1. Security Concepts
    2. Tightening Default Security
    3. SuSE Security Checker
    4. Security Advisories
    5. Fine Grained Authorizations with Polkit
    6. File Access Control Lists
    7. Manipulating FACLs
    8. Viewing FACLs
    9. Backing Up FACLs
    10. File Creation Permissions with umask
    11. User Private Group Scheme
    12. Alternatives to UPG
    13. AppArmor
    14. SELinux Security Framework
    15. SELinux Modes
    16. SELinux Commands
    17. Choosing an SELinux Policy
    18. SELinux Booleans
    19. Permissive Domains
    20. SELinux Policy Tools
    21. SUSE Basic Firewall Configuration
    22. FirewallD
    23. Lab Tasks
      1. User Private Groups
      2. Using Filesystem ACLs
      3. Exploring AppArmor
      4. Exploring SELinux Modes
      5. SELinux File Contexts
      6. SELinux Contexts in Action
  11. Basic Networking
    1. IPv4 Fundamentals
    2. TCP/UDP Fundamentals
    3. Linux Network Interfaces
    4. Ethernet Hardware Tools
    5. Network Configuration with ip Command
    6. Configuring Routing Tables
    7. IP to MAC Address Mapping with ARP
    8. Starting and Stopping Interfaces
    9. NetworkManager
    10. DNS Clients
    11. DHCP Clients
    12. SUSE YaST Network Configuration Tool
    13. Network Diagnostics
    14. Information from ss and netstat
    15. Hardware and System Clock
    16. Managing Network-Wide Time
    17. Continual Time Sync with NTP
    18. Configuring NTP Clients
    19. Useful NTP Commands
    20. Lab Tasks
      1. Network Discovery
      2. Basic Client Networking
      3. NTP Client Configuration
  12. Advanced Networking
    1. Multiple IP Addresses
    2. Configuring a DHCP server
    3. IPv6
    4. Interface Aggregation
    5. Interface Bonding
    6. Network Teaming
    7. Interface Bridging
    8. 802.1q VLANS
    9. Tuning Kernel Network Settings
    10. Lab Tasks
      1. Multiple IP Addresses Per Network Interface
      2. Configuring IPv6
      3. Troubleshooting Practice: Networking
  13. Log File Administration
    1. System Logging
    2. systemd Journal
    3. systemd Journal's journalctl
    4. Secure Logging with Journal's Log Sealing
    5. gnome-system-log
    6. Rsyslog
    7. /etc/rsyslog.conf
    8. Log Management
    9. Log Anomaly Detector
    10. Sending logs from the shell
    11. Lab Tasks
      1. Using the systemd Journal
      2. Setting up a Full Debug Logfile
      3. Remote Syslog Configuration
      4. Remote Rsyslog TLS Configuration
  14. Monitoring & Troubleshooting
    1. System Status – Memory
    2. System Status – I/O
    3. System Status – CPU
    4. Performance Trending with sar
    5. Determining Service to Process Mapping
    6. Real-time Monitoring of Resources — Cgroups
    7. Troubleshooting Basics: The Process
    8. Troubleshooting Basics: The Tools
    9. strace and ltrace
    10. Common Problems
    11. Troubleshooting Incorrect File Permissions
    12. Inability to Boot
    13. Typos in Configuration Files
    14. Corrupt Filesystems
    15. RHEL7 Rescue Environment
    16. SUSE Rescue Environment
    17. Lab Tasks
      1. System Activity Reporter
      2. Cgroup for Processes
      3. Recovering Damaged MBR
Class Materials

Each student will receive a comprehensive set of materials, including course notes and all the class examples.

Class Prerequisites

Experience in the following is required for this Linux class:

  • Students should already be comfortable working in a Linux or Unix environment. Fundamentals such as the Linux filesystem, process management, and how to edit files will not be covered in class.

Experience in the following would be useful for this Linux class:

  • An understanding of network concepts and the TCP/IP protocol suite is helpful.
Since its founding in 1995, InterSource has been providing high quality and highly customized training solutions to clients worldwide. With over 500 course titles constantly updated and numerous course customization and creation possibilities, we have the capability to meet your I.T. training needs.
Instructor-led courses are offered via a live Web connection, at client sites throughout Europe, and at our Geneva Training Center.