Duration 5 Days 30 CPD hours This course is intended for System administrators, IT security administrators, IT security engineers, and other professionals responsible for designing, implementing, maintaining, and managing the security of Red Hat Enterprise Linux systems and ensuring their compliance with the organization's security policies. Be a Red Hat Certified Engineer (RHCE©), or demonstrate equivalent Red Hat Enterprise Linux knowledge and experience. Overview Students that complete this course should be able to demonstrate these skills: - Analyze and remediate system compliance using OpenSCAP and SCAP Workbench, employing and customizing baseline policy content provided with Red Hat Enterprise Linux. - Monitor security-relevant activity on your systems with the kernel's audit infrastructure. - Explain and implement advanced SELinux techniques to restrict access by users, processes, and virtual machines. - Confirm the integrity of files and their permissions with AIDE. - Prevent unauthorized USB devices from being used with USBGuard. - Protect data at rest but provide secure automatic decryption at boot using NBDE. - Proactively identify risks and misconfigurations of systems and remediate them with Red Hat Insights. - Analyze and remediate compliance at scale with OpenSCAP, Red Hat Insights, Red Hat Satellite, and Red Hat Ansible Tower. This course is ideal for security administrators and system administrators who need to manage the secure operation of servers running Red Hat© Enterprise Linux©, whether deployed on physical hardware, as virtual machines, or as cloud instances. Maintaining security of computing systems is a process of managing risk through the implementation of processes and standards backed by technologies and tools. In this course, you will discover and understand the resources that can be used to help you implement and comply with your security requirements. This course is based on Red Hat Enterprise Linux 7.5, Red Hat Satellite 6.3, Red Hat Ansible© Engine 2.5, Red Hat Ansible Tower 3.2, and Red Hat Insights. 1 - MANAGE SECURITY AND RISK Define strategies to manage security on Red Hat Enterprise Linux servers. 2 - AUTOMATE CONFIGURATION AND REMEDIATION WITH ANSIBLE Remediate configuration and security issues with Ansible Playbooks. 3 - PROTECT DATA WITH LUKS AND NBDE Encrypt data on storage devices with LUKS and use NBDE to manage automatic decryption when servers are booted. 4 - RESTRICT USB DEVICE ACCESS Protect system from rogue USB device access with USBGuard. 5 - CONTROL AUTHENTICATION WITH PAM Manage authentication, authorization, session settings, and password controls by configuring pluggable authentication modules (PAMs). 6 - RECORD SYSTEM EVENTS WITH AUDIT Record and inspect system events relevant to security, using the Linux kernel's audit subsystem and supporting tools. 7 - MONITOR FILE SYSTEM CHANGES Detect and analyze changes to a server's file systems and their contents using AIDE. 8 - MITIGATE RISK WITH SELINUX Improve security and confinement between processes by using SELinux and advanced SELinux techniques and analyses. 9 - MANAGE COMPLIANCE WITH OPENSCAP Evaluate and remediate a server's compliance with security policies by using OpenSCAP. 10 - AUTOMATE COMPLIANCE WITH RED HAT SATELLITE Automate and scale your ability to perform OpenSCAP checks and remediate compliance issues using Red Hat Satellite. 11 - ANALYZE AND REMEDIATE ISSUES WITH RED HAT INSIGHTS Identify, detect, and correct common issues and security vulnerabilities with Red Hat Enterprise Linux systems by using Red Hat Insights. 12 - PERFORM A COMPREHENSIVE REVIEW Review the content covered in this course by completing hands-on review exercises. Additional course details: Nexus Humans Red Hat Security - Linux in Physical, Virtual, and Cloud (RH415) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Red Hat Security - Linux in Physical, Virtual, and Cloud (RH415) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for NULL Overview Topics include: basic file manipulation; basic and advanced filesystem features; I/O redirection and pipes; text manipulation and regular expressions; managing jobs and processes; vi, the standard Unix editor; automating tasks with shell scripts; managing software; secure remote administration; and more. The GL120 is a challenging course that focuses on the fundamental tools and concepts of Linux and Unix. Students gain proficiency using the command line. Beginners develop a solid foundation in Unix, while advanced users discover patterns and fill in gaps in their knowledge. Like all Guru Labs courses, the course material is designed to provide extensive hands-on experience. The GL120 is a challenging course that focuses on the fundamental tools and concepts of Linux and Unix. Students gain proficiency using the command line. Beginners develop a solid foundation in Unix, while advanced users discover patterns and fill in gaps
Duration 2 Days 12 CPD hours Overview This skills-focused course combines expert instructor-led discussions with practical hands-on labs that emphasize useful, current techniques, best practices and standards. Working in this hands-on lab environment, guided by our expert practitioner, you'll learn about and explore: Review of the File System Introduction to Shells: sh, bash, and ksh Shell Programming Advanced Shell Features Text Manipulation Utilities File Processing Utilities Multitasking and Batch Processing Regular Expressions Intermediate Linux: Shell, Bash, Text Manipulation, Multitasking & More is a two-day course designed to provide you with hands on experience using standard Linux commands and utilities used for day-to-day tasks including file manipulation, program execution and control, and effective use of the shell and desktop environments. Throughout the course you?ll explore key concepts to Linux core functionality, while learning the system's most commonly used commands. You?ll also learn the Bourne shell, Bash shell and Korn shell programming techniques you?ll need to read and modify existing shell scripts, and create your own. Data manipulation utilities and shell syntax for synthesizing command pipelines are also emphasized throughout the course. Review of the File System File System Organization File Types File and Directory Naming Rules and Conventions Commands for Navigating the File System Introduction to Inodes Ownership, Permissions, and Dates Manipulating Files and Links Manipulating Directories Determining Disk Usage Other File System Utilities Introduction to Shells: sh, bash, and ksh Shell Functions I/O Redirection and Pipes Command Separation and Grouping Background Execution Filename Expansion Shell Variables Command Substitution Quoting and Escaping Metacharacters Bash Shell Features Korn Shell Features Command Execution Startup Files Customizing the User Environment Shell Programming Shell Script Features and Capabilities Creating and Running a Script Working With Variables Environment Variables Working With Data Types Formatting Base Conversion Setting Special Attributes Input/Output Techniques Conditional Constructs if/then else/elif Looping Constructs for, while, until Math Operators Advanced Shell Features Manipulating Strings Writing and Calling Functions Controlling Process Priorities Interpreting Command Line Arguments Making Scripts Interactive Special Shell Variables Advanced I/O with Streams Improving Performance of Scripts Text Manipulation Utilities Editing a File from a Script Scripting with ed or sed UNIX and Linux Utilities to Manipulate Files Regular Expressions grep and egrep The Stream Editor sed Sorting in Scripts Generating Reports with awk Splitting Large Files Counting Words, Lines, and Characters Transforming File Contents File Processing Utilities Examining and Comparing Files Reporting Differences Between Files Comparing Files of Any Format Displaying Data in Octal and Hex Compressing Data Converting File Formats Extracting Text Strings Multitasking and Batch Processing Multitasking Scheduled Execution Using cron The at and batch Commands Regular Expressions Regular Expression Overview Regular Expression Implementations Regular Expressions RE Character Classes Regex Quantifiers RE Parenthesis Additional course details: Nexus Humans Intermediate Linux (TTLX2104) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Intermediate Linux (TTLX2104) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for IT professionals across a broad range of disciplines who need to perform essential Linux administration tasks including installation, establishing network connectivity, managing physical storage, and basic security administration. This course relates to Red Hat Enterprise Linux 7 and is designed for IT pros without previous Linux admin experience. The course focuses on providing students with Linux admin 'survival skills' by focusing on core admin tasks. Access the command line Log in to a Linux system and run simple commands using the shell. Manage files from the command line Copy, move, create, delete, and organize files from the bash shell prompt. Getting help in Red Hat Enterprise Linux Resolve problems by using online help systems and Red Hat support utilities. Create, view, and edit text files Create, view, and edit text files from command output or in an editor Manage local Linux users and groups Manage local Linux users and groups, and administer local password policies. Control access to files with Linux file system permissions Set Linux file system permissions on files and interpret the security effects of different permission settings. Monitor and manage Linux processes Obtain information about the system, and control processes running on it. Control services and daemons Control and monitor network services and system daemons using systemd. Configure and secure OpenSSH service Access and provide access to the command line on remote systems securely using OpenSSH. Analyze and store logs Locate and accurately interpret relevant system log files for troubleshooting purposes. Manage Red Hat Enterprise Linux networking Configure basic IPv4 networking on Red Hat Enterprise Linux systems. Archive and copy files between systems Archive files and copy them from one system to another. Install and update software packages Download, install, update, and manage software packages from Red Hat and yum package repositories. Access Linux file systems Access and inspect existing file systems on a Red Hat Enterprise Linux system. Use virtualized systems Create and use Red Hat Enterprise Linux virtual machines with KVM and libvirt.
Duration 3 Days 18 CPD hours This course is intended for This is an introductory-level course, designed for anyone wanting to learn Linux. Attendees should be comfortable working with computers and the command line, but no other specific skills are required to attend. Overview This skills-focused course is about 50% lab to lecture ratio, combining expert instructor-led discussions with practical hands-on labs that emphasize current techniques, best practices and standards. Working in a hands-on lab environment, guided by our expert practitioner, attendees will explore The Design of Linux Basic Operations File System Basics Wildcards File and Directory Permissions Working with files Executing Programs Using find Filters and other useful commands The vi editor Customizing the user environment Networking/Communications Backups and archiving This hands-on course provides you with an essentials-level foundation in core skills for using any version of Linux. This course focuses on essential skills that ordinary users might use daily when working with Linux. The Design of Linux A brief history of Linux The Linux design philosophy Linux architecture Basic Operations Logging in and out The general form of a Linux command Common commands Using man pages Essential commands File System Basics The Linux directory structure Standard directories Relative and absolute pathnames Legal file names Navigating the filesystem Wildcards Matching one character Matching many characters Shortcuts Wildcard gotchas Wildcards and ls File and Directory Permissions Viewing permissions File permissions Directory permissions Setting defaults Changing permissions Keeping data secure Working with files Viewing contents Identifying file contents Copying and moving Deleting Using symbolic links Executing Programs Redirecting STDOUT Redirecting STDERR Redirecting STDIN Creating pipelines Processes attributes Listing processes Killing processes Foreground & background processes Using find Syntax Finding by name, type, or size Combining tests Finding by size, owner, or timestamps Using xargs with find Other find options Filters and other useful commands What is a filter? cat: a generic filter head and tail grep sort wc other interesting filters The vi editor Why vi? Basic vi operations: navigating, adding, deleting Advanced operations: buffer management, search and replace, configuration options Customizing the user environment About shells Shell startup files Shell variables Search path Aliases Simple shell scripts Networking/Communications Reading and sending mail Remote login Remote file transfer Other network utilities (ping, finger, etc) Backups and archiving Checking space used or available Creating tar archives Viewing and extracting files from archives Compression utilities Working with windows
Duration 5 Days 30 CPD hours This course is intended for This course is intended for IT professionals who will be responsible for the support of guests and other virtual machines running in the z/VM environment. It assumes that these persons will have little or no experience in the z/VM environment. Additionally anyone responsible for installing, customizing, and maintaining Linux on System z. Overview Describe the process of running guests under z/VM Define virtual machines to z/VM and reload the directory Customize the CP component of the z/VM system Customize the TCP/IP files on z/VM Apply service to the z/VM system Install SUSE Linux on System z Install additional packages Describe zLinux system management process Describe zLinux backup and recovery procedures Manage and update zLinux network connectivity issues Implement the z/VM Performance Toolkit Prerequisite to z/VM and Linux Connectivity and Management (ZV100) Prerequisite to z/VM RACF and DirMaint Implementation (ZV200) Introduces system programmers to the tasks required to support a z/VM operating system; providing an overview of the processes required to install z/VM & perform the required tailoring steps to support guest operating system virtual machines & CMS users. z/VM and zLinux overview . Installation . Directory . CP system configuration . z/VM networking . VMSES/E . Installing SUSE Linux on System z . Installing additional packages . Network connectivity . System management . Backup and recovery . z/VM Performance Toolkit configuration .
Duration 5 Days 30 CPD hours Overview At the completion of this course, students already familiar with the RHCT/RHCSA administration skills will have exposure to all competencies tested by the RHCSA and RHCE exams. This course is designed for experienced Linux administrators who require networking and security administration skills. Getting Started with the Classroom Environment Given a virtualized environment, begin to administrate multiple systems using prerequisite skills Enhance User Security Configure system to use Kerberos to verify credentials and grant privileges via sudo Bash Scripting and Tools Automate system administration tasks utilizing Bash scripts and text-based tools File Security with GnuPG Secure files with GnuPG. Software Management Use yum plugins to manage packages and understand the design of packages to build a simple package Network Monitoring Profile running services then capture and analyze network traffic Route Network Traffic Configure system to route traffic and customize network parameters with sysctl Secure Network Traffic Secure network traffic through SSH port forwarding and iptables filtering/network address translation (NAT) NTP Server Configuration Configure an NTP server Filesystems and Logs Manage local file system integrity, monitor system over time, and system logging Centralized and Secure Storage Access centralized storage (iSCSI) and encrypt filesystems SSL-encapsulated Web Services Understand SSL certificates and deploy an SSL encapsulated web service Web Server Additional Configuration Configure web server with virtual hosts, dynamic content, and authenticated directories Basic SMTP Configuration Configure an SMTP server for basic operation (null client, receiving mail, smarthost relay) Caching-Only DNS Server Understand DNS resource records and configure a caching-only name server File Sharing with NFS Configure file sharing between hosts with NFS File Sharing with CIFS Configure file and print sharing between hosts with CIFS File Sharing with FTP Configure file sharing with anonymous FTP Troubleshooting Boot Process Understand the boot process and recover unbootable systems with rescue mode Additional course details: Nexus Humans Enterprise Linux System Admin 3 with Exam Prep training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Enterprise Linux System Admin 3 with Exam Prep course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Senior Linux system administrators responsible for maximizing resiliency though high-availability clustering services and using fault-tolerant shared storage technologies. Overview As a result of attending this course, students should be able to create, manage, and troubleshoot highly available network services and tightly coupled cluster storage for business-critical applications. Students should be able to demonstrate the following skills: Improve application uptime by using high-availability clustering Manage storage in a high-availability environment using iSCSI initiators, HA-LVM or CLVM as appropriate, and GFS2 cluster file systems Implement strategies to identify single points of failure in high-availability clusters, and eliminate them This course will guide you through an intensive, hands-on experience with the Pacemaker component of the Red Hat Enterprise Linux High-Availability Add-On, as well as cluster storage components from the Resilient Storage Add-On, including Cluster Logical Volume Manager (CLVM), Red Hat Global File System 2 (GFS2), and Device-Mapper Multipath.This course covers the same material as RH436, but includes the Red Hat Certified Specialist in High Availability Clustering exam (EX436). This course is based on Red Hat Enterprise Linux 7.1. Clusters and storage Get an overview of storage and cluster technologies. Create high-availability clusters Review and create the architecture of Pacemaker-based high-availability clusters. Nodes and quorum Review cluster node membership and how quorum is used to control clusters. Fencing Understand fencing and fencing configuration. Resource groups Create and configure simple resource groups to provide high-availability services to clients. Troubleshoot high-availability clusters Identify and troubleshoot cluster problems. Complex resource groups Control complex resource groups by using constraints. Two-node clusters Identify and work around two-node clusters issues. ISCSI initiators Manage iSCSI initiators for access to shared storage. Multipath Storage Configure redundant storage access. Logical volume manager (LVM) clusters Manage clustered LVM. Global File System 2 Create symmetric shared file systems. Eliminate single points of failure Eliminate single points of failure to increase service availability. Comprehensive review Set up high-availability services and storage.
Duration 3 Days 18 CPD hours This course is intended for This advanced course is designed for those individuals who are responsible for operating and managing the operation of an IBM i system. Overview Explain the concept of how LPAR works Explain the functions served by the HMC Explain how user versus resource security are implemented Explain the difference between group profiles and authorization lists Describe how adopted authority works Describe how work is managed on the system and the concepts of the performance tuning process on the system Explain how Management Central can be used to manage a single system or a network of System i servers Perform the steps to create a basic CL program using both the traditional (PDM and SEU) and the newer GUI (RSE and LPEX) application development tools Perform the steps to create a menu using SDA Provide some tips on how you can improve your operations This course is designed to enhance the skills of an IBM i System Operator. This course explains the concept of how LPAR works and discusses the functions provided by the HMC LPAR concepts and overview . Console options and HMC overview . IASP concepts and overview . Security concepts and overview . System values . User security (user and group profiles) . Resource security . Authorization lists and adopted authority . Management Central overview . Commands and tasks using Management Central . Inventory using Management Central . System values using Management Central . Other Management Central functions . Work management: Concepts and overview . Work management: Subsystem concepts and overview . Work management: Job processing concepts and interactive jobs . Work management: Job processing concepts of other job types . Work management: Submitting and tracking of batch jobs . Programming concepts . CL programming concepts . Using PDM and SEU to create a CL program . Starting and setting up RSE . Creating a CL program using RSE and LPEX Editor . Creating a menu using SDA . Tips for improved operation .
This course explores Autism and the current body of thinking and knowledge around Autistic Spectrum Disorders. This enables learners to consider how to adapt their practice with useful strategies to better support an individual with autism.