Administering Red Hat Linux 6 - Part 3

Course Code: RHSA3

Duration: 4 days


Administering Red Hat Linux 6 - Part 3 Course Overview

This highly practical instructor led Administering Red Hat Linux 6 - Part 3 training course is designed to give delegates practical experience in the areas of networking, security and basics of shell scripting. With a strong emphasis on practical hands-on training, this course will teach the essential network, security and shell scripting tasks required on a Red Hat Linux system.

Course Objectives

On completion of this Administering Red Hat Linux 6 - Part 3 course the delegate will have gained practical experience of networking, securing and scripting on a Red Hat Linux system.

Who will the Course Benefit?

The Administering Red Hat Linux 6 - Part 3 course is designed for System Administrators and Programmers and other technical IT staff who need to acquire knowledge of the key networking, security and scripting tasks required to administer a Linux system.

The course assumes administration knowledge of the Red Hat Linux operating system to the level covered in theAdministering Red Hat Linux 6 - Part 1 and Administering Red Hat Linux 6 - Part 2 courses.

Skills Gained

The delegate will learn and acquire skills as follows:

  • Configure the system to use Kerberos security
  • Setting up network bridges for virtualised systems
  • Create shell scripts to automate tasks
  • Implement security for files and networks
  • Configure routing of network traffic
  • Setup a Network Time Protocol Server
  • Access centralised file systems
  • Understand encryption techniques
  • SSL and Additional Web server configuration techniques
  • Configure a basic SMTP server
  • Configure a NFS and FTP servers
  • Configure a DNS server
  • Configure a Secure Firewall Configuration
  • Setup CIFS and configure file and print sharing
  • Allow file sharing with Anonymous FTP
  • Recovery an un-bootable system

Administering Red Hat Linux 6 - Part 3 Training Course

Course Introduction

  • Administration and Course Materials
  • Course Structure and Agenda
  • Delegate and Trainer Introductions

Session 1: Administering a Virtual Environment

  • Revision of the virtualised environment
  • Creating a Network Bridge
  • Configuring the Firewall for a Network Bridge
  • Configuring a New KVM Virtual Network
  • Exercise

Session 2: Further Software Management

  • The Yellow Dog Update, Modifier Tool (YUM)
  • Creating a YUM repository
  • Configuring YUM plugins
  • Understand the design of a package
  • Build a simple package
  • Exercise

Session 3: File Security and Integrity

  • System Security
  • Extended Permissions
  • GPG
  • Why encrypt data and verify the sender
  • Key pairs and management
  • Using Digital signatures
  • Checking and repairing file systems
  • Exercise

Session 4: Network Management

  • Routing under Linux
  • IPROUTE suite of programs
  • Configuring network cards and Routing
  • Configuring the system as a Gateway
  • IPV6 Addressing Overview
  • Network tools :ethereal, tethereal, tcpdump, netstat, wireshark,etc
  • Configure Ethernet Bonding
  • Exercise

Administering Red Hat Linux 6 - Part 3 Training Course

Session 5: Securing Networks: Firewalls

  • Netfilter - iptables
  • Packet Filtering using iptables
  • Rule Targets
  • Basic Rules and their Operation
  • Connection Tracking
  • Firewalls with Virtual Machine Bridges
  • Debugging Route Problems
  • Source and Destination NAT Configuration
  • Red Hat supplied tools for iptables configuration
  • Exercise

Session 6: DNS

  • The DNS/BIND system under Red Hat Linux
  • Name Server Hierarchy
  • Setting up DNS
  • Master/Slave Zones
  • Reverse lookup Zones
  • Record types and their syntax
  • Name Daemon Control Utility (rndc)
  • Address Match Lists (acl)
  • Configuring a Caching Only Name Server
  • DNS in a chroot environment
  • Testing a DNS server
  • Exercise

Session 7: Centralised and Secure Storage

  • What is ISCSI
  • Setting up ISCSI Target and Initiator
  • Accessing Centralised Storage
  • Encrypting file systems
  • Accessing encrypted file systems
  • Exercise

Session 8: Configuring Network Time Protocol

  • Stratum Levels
  • Choosing a time source
  • Configuring the ntp daemon
  • NTP roles
  • Setting up an NTP Server and Client
  • Direct or Broadcast Polling
  • Allowing NTP connections
  • Syncing considerations
  • Exercise

Administering Red Hat Linux 6 - Part 3 Training Course

Session 9: Sharing Files across the Network

  • Configure file sharing using NFS
  • NFS commands
  • Automounter
  • Introduction to CIFS(SAMBA)
  • Configure file sharing between hosts with CIFS
  • Using Konqueror and Gnome to access shares
  • Configuring an FTP server
  • Anonymous users
  • Controlling access to the FTP server
  • Using the sftp command
  • Exercise

Session 10: Advanced Security

  • Administrative Privileges
  • Configure sudo privileges
  • What is Kerberos
  • Configuring a Kerberos 5 Server
  • Setting up the Kerberos Client
  • Exercise

Session : 11 Basic Mail Server Configuration

  • Email Components
  • Mail User, Mail Transport and Mail User Agents
  • Configuring sendmail and postfix
  • Sendmail Configuration Files
  • Sendmail Configuration with the m4 Macro Language
  • Managing Virtual Addresses
  • Macro Definitions
  • Switching to postfix, a sendmail replacement
  • Postfix Configuration
  • Procmail delivery agent
  • Configuring a null client using Postfix
  • Dovecot - POP and IMAP services
  • Exercise

Session 12: SSL and Web Service Configuration

  • Data Security and Encryption
  • Public Key Encryption
  • Configuring Virtual Hosts : Name And IP Based Access
  • Displaying Apache Web Server Information and Status
  • Dynamic Virtual hosts
  • Configuring HTTPS
  • Signed Certificates
  • Apache SSL Configuration File
  • HTTPS Virtual Hosts
  • Exercise

Administering Red Hat Linux 6 - Part 3 Training Course

Session 13: Shell Scripting

  • What is a shell script?
  • Creating and executing shell scripts
  • User interaction
  • Command line arguments
  • Decision constructs using the 'if' statement
  • Case statement
  • Looping constructs: for/while/until
  • Automating administrative tasks
  • Exercise

Session 14: Troubleshooting Un-Bootable Systems

  • Troubleshooting Linux
  • The Rescue Environment
  • Common boot problems and their resolution
  • Booting into GRUB (Maintenance Mode)
  • Booting an un-bootable system into Recovery Mode
  • Booting from USB devices
  • Reinstalling the GRUB Loader
  • Exercise
  • Course technical content is subject to change without notice.
  • Course content is structured as sessions, this does not strictly map to course timings. Concepts, content and practicals often span sessions.


The delegate should be familiar with basic computer concepts and terminology e.g. hardware, software, files and directories.

Pre-Requisite Courses

Course Reviews

A thoroughly enjoyable and well-rounded course with an outstanding trainer.

David - Systems Manager - Government

An excellent lecturer with deep knowledge of the subject.

Colin - Base Support Team Leader - Government

My head hurts from just being in the class! Top rated training and would recommend same for anyone who wishes to explore the limits of what is possible with Linux administration.

Abel - Manager, E-Channels - IT

Very knowledgeable instructor, course structure was flexible and informative. I have learnt so much and enjoyed the course immensely.

Ricky - Operations

Good course, thanks Mark.


Experienced instructor with insight into the needs of the student. The course has great breadth and would benefit anyone wishing to learn or refresh their Linux/UNIX skillset.

David - UNIX server Specialist

Public Scheduled Events

Classroom & Live Virtual Instructor-Led Training

Duration: 4 days

Price: £1,895.00 exc. VAT 

Please contact us to review your requirements and schedule a date.


Live Virtual Classroom

Join live instructor-led classroom training from the comfort of your home or office.
All the convenience and benefits of the classroom experience without the hassle and costs of travel and accommodation.

Our Customers Include

missing image
missing image
missing image
missing image
missing image
missing image
missing image
missing image
missing image
missing image
missing image
missing image
missing image
missing image
missing image
missing image
missing image
missing image
missing image
missing image
missing image
missing image
missing image
missing image

Our Course Curriculum

Facebook LinkedIn Twitter Instagram E-Mail


StayAhead Training Limited are not affiliated to Red Hat Inc. in any way.  Red Hat, Red Hat Certified Engineer, RHCE, are registered trademarks and Red Hat Certified System Administrator and RHCSA are trademarks of Red Hat Inc.  No exams are included in the Red Hat Linux courses.

+44 (0)20 7600 6116
Copyright © 2021 StayAhead Training Ltd
Cookies   /   Privacy Policy