O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Red Hat Certified Engineer

Video Description

Linux is the most important operating system on the Internet. It's recognized everywhere as the cost-effective way to operate all kinds of servers. With the support of powerhouses like IBM, Dell, HP, and Sun, demand for Linux servers is growing. Red Hat is the dominant player in Linux. And the Red Hat Certified Engineer is perhaps the most important of the "hands-on" exams recognized for testing real skills. This practical "how to" course by VTC author Mike Jang, uses practical examples to demonstrate the skills tested by the RHCE exam. To begin learning simply click the movie links.

* Captions not available on CD version.

Table of Contents

  1. Introduction
    1. Welcome 00:05:28
    2. System Requirements 00:02:54
  2. Additional Information for the RHCE Exam
    1. What Else to prepare for the RHCE Exam 00:02:09
    2. Logical Volume Management 00:04:07
    3. Logical Volumes During Installation 00:06:00
    4. Logical Volumes After Installation Pt.1 00:02:20
    5. Logical Volumes After Installation Pt.2 00:06:09
    6. Setting up a Kickstart File 00:04:49
    7. An Automated Kickstart Installation 00:03:48
    8. Reviewing Rescue Mode 00:06:23
    9. Problems during the boot process 00:04:35
    10. What can go wrong with GRUB 00:07:36
    11. Create a network installation server 00:05:01
  3. System Monitoring and Fault Analysis
    1. System Performance and Security Concepts 00:04:46
    2. System Faults and Breaches 00:05:00
    3. Method of Fault Analysis 00:03:03
    4. Benefits of System Monitoring 00:03:20
    5. Managing Process by Account 00:02:24
  4. System Service Analysis
    1. System Service Access Controls 00:06:48
    2. Service and Network Access Controls 00:04:30
    3. Service and Application Access Controls 00:03:06
    4. tcp_wrappers Configuration 00:04:11
    5. Security Enhanced Linux (SELinux) 00:05:09
  5. Network Configuration and Security
    1. Network Resource Access Controls 00:03:20
    2. Dynamic Interface Configuration 00:03:48
    3. Static Interface Configuration 00:03:10
    4. Routing Configuration Pt.1 00:02:28
    5. Routing Configuration Pt.2 00:05:52
    6. Netfilter Overview 00:06:11
    7. iptables Firewall Rules 00:06:09
    8. Firewall Rules by IP address 00:06:21
    9. Network Access Translation (NAT) 00:03:17
  6. Network Support Services
    1. Organizing Networked Systems 00:02:08
    2. Host Name Resolution 00:03:07
    3. Trace a DNS Query with the dig command 00:02:47
    4. Exploring DNS with the host command 00:02:49
    5. An Overview of Domain Name Services 00:03:15
    6. DNS Packages 00:05:14
    7. Configuring a BIND Caching Nameserver 00:06:29
    8. Setting up a Slave Nameserver 00:05:17
    9. Host Name Resolution 00:04:04
    10. The DHCP Service 00:05:57
    11. Configuring an NTP Server 00:05:37
  7. Sharing on a Network
    1. Network File Sharing Services 00:02:26
    2. FTP - Basic Server Configuration 00:05:05
    3. FTP - Security Options 00:06:09
    4. NFS - Basic Server Configuration 00:03:47
    5. NFS - Security Options 00:04:49
    6. Samba - Basic Server Configuration 00:06:10
    7. More on Samba 00:06:25
    8. Samba Security Options 00:03:59
    9. File Server Security 00:03:28
  8. Apache Web Services and More
    1. Apache Web Services 00:03:02
    2. Critical Apache Configuration Directives 00:06:28
    3. Creating a Virtual Host 00:06:55
    4. Limiting Access to an Apache Website 00:05:33
    5. Apache and SELinux 00:03:39
    6. Creating a Secure Apache Host 00:07:24
    7. Configuring the Squid Web Proxy 00:05:27
  9. Configuring Email Services
    1. Email Protocols and Agents 00:04:02
    2. Basic sendmail Configuration Pt.1 00:04:33
    3. Basic sendmail Configuration Pt.2 00:03:38
    4. Basic Postfix Configuration 00:04:33
    5. Switching Between SMTP Services 00:02:47
    6. Mail Retrieval Protocols 00:03:39
  10. Creating Secure Remote Access
    1. A Secure Shell Server 00:06:17
    2. Configuring Secure Certificates 00:05:24
    3. Secure Shell Keys 00:07:10
  11. Account Security
    1. Basic Account Management 00:03:02
    2. Name Service Switching 00:04:19
    3. Pluggable Authentication Modules (PAM) 00:04:19
    4. Utilities and Authentication 00:04:52
    5. Making PAM Work For You 00:05:57
  12. Troubleshooting and System Maintenance
    1. Use the Rescue Environment 00:06:38
    2. Diagnose and Correct Boot Failures 00:06:04
    3. Address Problems with Network Services 00:06:04
    4. Add, Remove, and Resize Logical Volumes 00:03:22
    5. Diagnose SELinux Network Problems 00:02:32
  13. Installation and Configuration
    1. Install Packages for Network Services 00:04:08
    2. Configure SELinux for Network Services 00:02:49
    3. Configure Services to Start on Boot 00:03:43
    4. Configure Basic Service Operation 00:03:29
    5. Configure User/Host-based Security 00:03:52
    6. Configure Kickstart Installations 00:02:45
    7. Add Logical Volumes during Installation 00:03:47
    8. Use iptables to for Firewalls and NAT 00:04:33
    9. Use PAM for User-Level Restrictions 00:03:35
  14. Wrap-up
    1. Wrap-up Pt.1 00:03:33
    2. Wrap-up Pt.2 00:05:36
  15. Credits
    1. About the Author 00:01:23