Login to enhance your shopping experience

Login or Create an Account

cart Shopping Cart

Items: 0 |

Total: $0.00

  • Linux Admin Tips, News and More
Main Menu
Online Store Menu
Shopping Cart

There are no items in your shopping cart.

Account Menu
Popular Pages

Live CentOS Training Class

Live CentOS Training Class

Live CentOS Training Class

Our instructor-led CentOS class provides students with the skills needed to build and maintain a CentOS server 5.x and 6.x. Each student will have a weekly, one-on-one session with a certified instructor to help answer questions and demonstrate principles of CentOS server management and server daemons. This is a 10 hour course (2 hours each week) that includes two printed manuals (1000 pages) 8.5 x 11" lay flat and online Flash videos. Students are provided a VMWare image to build a server on their local desktop or we can help you build a server from scratch.

The CentOS Server Management Manual covers over 500 pages of server management training and includes 75 lab projects.
Historical Development of Linux, Researching Distributions, The Choice of an Enterprise Server, Finding Help, Tasks of a Linux Administrator
Text Editors vi and nano
The Boot Process
Includes the boot process, GRUB, Init Process, Startup Scripts, Daemons, rc.d Directory
Managing Services
How to turn services off that you are not using. How to manage the services you need for best security.
Process Management
Managing Processes, Nice, Creation of Process, Signals, How to Kill Processes, Process States, ps, top, /proc File System, Tracing System Calls, Dealing with Wild Processes
Managing the File System
Pathnames, Mounting/Unmounting File Systems, A Linux Standard, File Types, File Permissions
Managing Users
Create users, Change User Information, /etc/shadow, /etc/group, Files When a User is Created, Passwords, Password Control, Check Password, Creating Access Control Lists, Monitoring User Activity with psacct
Managing Quotas
quota Commands, Start Quotas, Setup User Quotas, Setup group Quotas, Create Profiles, Turn Quotas Off, Maintain Quotas
Managing System Logs
Create a New Log, Special Log Files, View System Logs, Log Watch, Create a New alias, Create Remote Logs, View Remote Files, Altered Log Files, Security Steps for Logs, Modify Log Output, Add Program Logs
Managing Hard Drives
Partitions, Swap Space, Formatting Floppy Drives, Using fdisk to Create Partitions, Listing Partitions With fdisk, File System Formats, Mounting Drives, Enhancing Hard Drive performance, fstab, Add an Additional Device, LVM Logical Volume Manager,Create a LVM, Rename Logical Volume, Remove a Logical Volume, RAID, Creating RAID 0,1,and 5
Managing Backups
Backup Media, Using tar, Search the Contents of a tar File, Simple tar Script, Using dd to Clone Drives
Managing Automated Actions
Using at, Using cron
Managing Updates
yum Log, yum Repositories, Updating, Install New Programs, Remove Programs
Basic Networking
LAN - Local Area Network, WAN - Wide Area Network, Ethernet Media, Network Design, Network Relationship, Using Network Commands, Important Network Files
Webmin: Remote Access
Webmin Security, Webmin Options
VNC Remote Access
Create Users, Start the Server, Set VNC Server to be On at Boot, Client Login
SSH Secure Remote Access
SSH Basics, Generate a Key Pair, Known Hosts,Fingerprints, Making Connections, Transfer Files Using scp, Using sftp for Secure File Transfer, Remote X Window With SSH, SSH Tunneling
Kernel Development
How to Configure the Kernel, Tune Kernel Parameters, Load Drivers and Modules into an Existing Kernel on the Fly, Build a New Kernel
X Window System
X Window Components, X Display Manager, X Applications, Client Authentication, X Server Configuration
Server Security
Layered Security, Reducing Spam and Attack by Limiting IP Addresses, Securing Services, Managing Services, Manage xinetd, tcp_wrappers, Securing The Firewall, Port Scan Attack Detector Security Assessment, Securing the Network Connections, Network Monitoring, Wireshark, Rootkit Hunter, AIDE

The CentOS Server Daemons Manual is over 500 pages of server daemon training with 40 Labs. This step-by-step manual will guide you through setting up and managing server daemons.
SELinux Decision Making Process, Using setroubleshoot
SELinux with Apache, Modules, Performance Tuning, Log Files, Virtual Hosting, IP Based Hosting, Access Control, .htaccess File, Creating an SSL Certificate, Process of Setting Up Certificate, LAMP Installation, Install PHP, MySQL Basics
Squid Proxy Server
Important Locations, Set Squid to Run at Startup, Hardware Requirements, Visible Hostname, Administrative Contact
VSFTP Server
Security Issues With FTP, Enable Local Access, Controlling Access of Local Users, chroot Local User, Access Control With tcp_wrappers, Control Access With xinetd, Limiting Users, Anonymous Server Setup, iptables Firewall Problems, Enhance Security Settings
Network File System
Uses for NFS, Quick Start, NFS Set Up with GUI
Sendmail Server
Sendmail Introduction, Switch Default Mail to Sendmail, Mail Server Basics, Mail Access Protocols, Sendmail Basic Install, Sendmail Foundations, Foundation #1: Configuration Files, The Queue, Aliases, Control SPAM, Deny Relaying, Use the Access Database, access, Use a Blackhole List Service
DNS Server
How DNS Works, Delegation, Zone File Examples, DNS Server, DNS Service, DNS Client, DNS, Server Design, Options Statement, Zone Statements, Create a Zone Statement, Mail Requirements, hosts, Hierarchical Structure, Top Level Domains, Name Servers, Zones vs Domains, Types of Name Servers, Registering a Domain, Lame Server, Forwarding, Test DNS Settings, Creating a chroot Jail, Install the Jail, Configure /etc/resolv.conf, hostname
Samba Introduction
Samba Install and Start, smb.conf, testparm, Sections in smb.conf, Create Shared Directory, NetBIOS and WINS, Browsing the Network, Creating User Accounts, Home Directories, Managing Groups, Recycle Bin, Variables, Virtual Samba Servers, Network Access Options, Printing, Privileges
Basic Tips, DHCP Server
Command Conventions, Direction of Packet Flow, Tables, Chains and Targets, Rule Targets, Chain Functions, Listing Tables, Deleting User-defined Chains, Flushing Tables, Setting the Default Policy, Matching Source IP Addresses, Matching Destination IP Address, Controlling Port Matches, Matching Protocol, Saving iptables, NAT

Video Examples

vi: Using the Unamed Buffer
Yum Priorities
Rsync: With Excludes



Required fields are marked with a star (*). Click the 'Add To Cart' button at the bottom of this form to proceed.

Item Quantity


Enter the appropriate quantity for this item below.

Kryptronic Internet Software Solutions