Next: D. LINUX Advocacy FAQ
 Up: rute
 Previous: B. LPI Certification Cross-Reference
     Contents 
Subsections
RedHat has encouraged a larger number of overlapping courses, some of which
contain lighter and more accessible material. They concentrate somewhat on RedHat
specific issues that are not always applicable to other distributions.
In some areas they expect more knowledge than the LPI, so it is worth
at least reviewing RedHat's requirements for purposes of self-evaluation.
The information contained in this appendix was gathered from discussions
with people who had attended the RedHat courses. This is intended purely
for cross-referencing purposes and is possibly outdated. By no means should it be
taken as definitive. Visit http://redhat.com/training/rhce/courses/
for the official guide.
For each objective, the relevant chapter or section from this book
is referenced in parentheses.
These courses are beneath the scope of this book: They cover
LINUX from a user and desktop perspective. Although
they include administrative tasks, they keep away from
technicalities. They often prefer graphical configuration programs to
do administrative tasks. One objective of one of these
courses is configuring Gnome panel applets; another is learning
the 
pico text editor.
This certification seems to be for administrators of non-LINUX
systems who want to extend their knowledge. The requirements
below lean toward understanding available LINUX alternatives and
features, rather than expecting the user to actually configure
anything complicated. Note that I abbreviate the RedHat Installation
Guide(s) as RHIG. This refers to the install help in the installation
program itself or, for RedHat 6.2 systems, the HTML installation
guide on the CD. It also refers to the more comprehensive online documentation
at http://www.redhat.com/support/manuals/.
- -
 - Finding Web docs. Using HOWTOs to locate supported hardware (Chapter 16).
 - -
 - Knowledge of supported architectures and SMP support
	(Chapter 42).
 - -
 - Use of 
kudzu (I do not cover 
kudzu and recommend that you uninstall it).
 - -
 - Hardware concepts--IRQ, PCI, EISA, AGP,
	    and I/O ports
	 (Chapters 3 and 42).
 - -
 - 
isapnp, 
pciscan
	 (Chapter 42).
 - -
 - Concepts of LINUX support for PCMCIA, PS/2, tapes, scanners,
	USB (Chapter 42).
 - -
 - Concepts of serial, parallel,
	SCSI, IDE, CD-ROM and floppy devices,
         and their 
/dev/ listings (Chapter 18).
 - -
 - 
hdparm (
hdparm(8)).
 - -
 - Concepts of IDE geometry, BIOS limitations (Chapter 19).
 - -
 - Disk sector and partition structure. Use of 
fdisk, 
cfdisk, and
         diskdruid (Chapter 19).
 - -
 - Creation of a partitioning structure (Chapter 19).
 - -
 - Management of swap, native, and foreign partitions during installation (RHIG).
 - -
 - Concept of distribution of directories over different partitions (Chapter 19).
 - -
 - Configuring 
lilo on installation (Chapter 31 refers to general use of 
lilo).
 - -
 - BIOS configuration (Chapter 3).
 - -
 - Conceptual understanding of different disk images. Creating and booting disk images
	from their 
boot.img, 
bootnet.img, or 
pcmcia.img (RHIG).
 - -
 - Use of the installer to create RAID devices (RHIG).
 - -
 - Package selection (RHIG).
 - -
 -  X video configuration (Chapter 43 and RHIG).
 
- -
 - Using 
setup, 
mouseconfig,
	
Xconfigurator,
        
kbdconfig, 
timeconfig, 
netconfig,
        
authconfig, 
sndconfig. (These are higher level
	interactive utilities than the ones I cover in Chapter 42
	and elsewhere. Run each of these commands for a demo.)
 - -
 - Understanding 
/etc/sysconfig/network-scripts/ifcfg-*
	(Chapter 25).
 - -
 - Using 
netcfg or 
ifconfig
	(Chapter 25).
 - -
 - Using 
ifup, 
ifdown,
	
rp3, 
usernet, and
        
usernetctl  (Chapter 25).
 - -
 - Using 
pnpdump, 
isapnp and editing
        
/etc/isapnp.conf (Chapter 42).
 - -
 - Conceptual understanding of 
/etc/conf.modules, 
esd,
        and 
kaudioserver (Chapter 42; man pages for same).
 - -
 - Using 
mount, editing 
/etc/fstab (Chapter 19).
 - -
 - Using 
lpr, 
lpc, 
lpq,
	
lprm, 
printtool
        and understanding concepts of 
/etc/printcap (Chapter 21).
 - -
 - Virtual consoles concepts: changing in 
/etc/inittab (Chapter 32).
 - -
 - Using 
useradd, 
userdel,
	
usermod, and 
passwd (Chapter 11).
 - -
 - Creating accounts manually and with 
userconf and with
        
linuxconf. (The use of graphical tools is discouraged by this book.)
 - -
 - Understanding concepts of the 
/etc/passwd and 
/etc/group files and
        
/etc/skel and contents (Chapter 11).
 - -
 - Editing 
bashrc, 
.bashrc, 
/etc/profile,
        
/etc/profile.d (Chapter 20).
 - -
 - General use of 
linuxconf. (The use of graphical tools is discouraged by this book.)
 - -
 - Using 
cron, 
anacron, editing 
/var/spool/cron/<username>
	and 
/etc/crontab. 
tmpwatch, 
logrotate,
        and locate cron jobs.
 - -
 - Using 
syslogd, 
klogd,
	
/etc/syslog.conf, 
swatch,
        
logcheck.
 - -
 - Understanding and using 
rpm. Checksums, file listing, forcing,
        dependencies, querying, verifying querying tags, provides, and
        requires. FTP and HTTP installs, 
rpmfind, 
gnorpm,
        and 
kpackage (Chapter 24).
 - -
 - Building 
.src.rpm files. Customizing
	and rebuilding packages. (See the RPM-HOWTO.)
 - -
 - 
/usr/sbin/up2date. (The use of package is discouraged by this book.)
 - -
 - Finding documentation (Chapter 16).
 
- -
 - Laptops, PCMCIA, 
cardmanager, and 
apm. (See the RHIG, PCMCIA-HOWTO and Laptop-HOWTO.)
 - -
 - Multiboot systems, boot options, and alternative
        boot image configuration (Chapter 31).
 - -
 - Network installations using 
netboot.img (RHIG).
 - -
 - Serial console installation (RHIG?).
 - -
 - Kickstart concepts.
 
- -
 - 
/proc file system concepts and purpose of various
        subdirectories (see Section 42.4 and the index entries for 
/proc/).
	Tuning parameters with 
/etc/sysctl.conf (see 
sysctl.conf(5)).
 - -
 - Disk quotas. 
quota, 
quotaon, 
quotaoff,
        
edquota, 
repquota,
	
quotawarn, 
quotastats.
	(Quotas are not covered but are easily learned form the
	Quota mini-HOWTO.)
 - -
 - System startup scripts' initialization sequences. 
inittab,
        switching run levels. Conceptual understanding of various 
/etc/rc.d/
        files. SysV scripts, 
chkconfig, 
ntsysv, 
tksysv,
        
ksysv (Chapter 32).
 - -
 - Configuring software RAID. Using 
raidtools to activate and test
        RAID devices (see the RAID-HOWTO).
 - -
 - Modules Management. 
modprobe, 
depmod, 
lsmod,
        
insmod, 
rmmod commands.
	
kernelcfg. Editing of
        
/etc/conf.modules,
	aliasing and 
optioning modules (Chapter 42).
 - -
 - Concepts of kernel source, 
.rpm versions, kernel versioning system.
        Configuring, compiling and installing kernels (Chapter 42).
 
- -
 - TCP/IP concepts. 
inetd. Port concepts and service-port
        mappings (Chapters 25 and 26).
 - -
 - 
apache, config files, virtual hosts (Chapter 36).
 - -
 - 
sendmail, config files, 
mailconf, 
m4 macro
        concepts (Chapter 30).
 - -
 - POP and IMAP concepts (Chapters 29 and 30).
 - -
 - 
named configuration (Chapter 40).
 - -
 - FTP configuration. (I did not cover FTP because of the huge number of
	FTP services available. It is recommended that you try the 
vsftpd package.)
 - -
 - configuration, 
/etc/rc.d/init.d/netfs (Chapter 28).
 - -
 - 
smbd, file-sharing and print-sharing concepts. Security concepts
        config file overview. Use of 
testparam, 
smbclient,
        
nmblookup, 
smbmount, Windows authentication
        concepts (Chapter 39).
 - -
 - 
dhcpd and BOOTP, config files and concepts. Configuration with
        
netcfg, 
netconfig or 
linuxconf. using
        
pump (see the DHCP mini-HOWTO).
 - -
 - Understanding 
squid caching and forwarding concepts.
	(The squid configuration file 
/etc/squid/squid.conf
	provides ample documentation for actually setting up 
squid.)
 - -
 - Overview of 
lpd, 
mars-nwe, time services, and news
        services (Chapter 21).
 
- -
 - X client server architecture (Section 43.1).
 - -
 - Use of 
Xconfigurator,
	
xf86config, 
XF86Setup,
        and concepts of 
/etc/X11/XF86Config (Section 43.6.3).
 - -
 - Knowledge of various window managers, editing
        
/etc/sysconfig/desktop. Understanding of
        concepts of different user interfaces: Gnome, KDE.
        Use of 
switchdesk (Section 43.3.4).
 - -
 - 
init run level 5 concepts,
	
xdm, 
kdm,
        
gdm, 
prefdm
	alternatives (Section 43.9).
 - -
 - 
xinit, 
xinitrc concepts. User config
        files 
.xsession and 
.Xclients (see
	
xinit(1), 
xdm(1), 
startx(1), and read the
	scripts under 
/etc/X11/xinit/ and 
/etc/X11/xdm).
 - -
 - Use of 
xhost (Section 43.3.5). Security issues.
	
DISPLAY environment variable. Remote
	displays (Section 43.3.2).
 - -
 - 
xfs concepts (Section 43.12).
 
- -
 - Use of 
tcp_wrappers (Chapter 29). User and host based access
        restrictions. PAM access. Port restriction with
        
ipchains (see the Firewall-HOWTO).
 - -
 - PAM concepts. Editing of 
/etc/pam.d, 
/etc/security
        config files. PAM documentation (see 
/usr/share/doc/pam-0.72/txts/pam.txt).
 - -
 - NIS concepts and config files. 
ypbind, 
yppasswd
        
ypserv, 
yppasswdd, 
makedbm,
        
yppush (see the NIS-HOWTO).
 - -
 - LDAP concepts. OpenLDAP package, 
slapd, 
ldapd,
        
slurpd, and config files. PAM integration.
 - -
 - 
inetd concepts. Editing of 
/etc/inetd.conf,
        interface to 
tcp_wrappers. Editing of
        
/etc/hosts.allow and 
/etc/hosts.deny.
        
portmap, 
tcpdchk, 
tcpdmatch,
        
twist (see the LDAP-HOWTO).
 - -
 - 
ssh client server and security concepts (Chapters 12
	and 44).
 
- -
 - Static and dynamic routing with concepts.
        
/etc/sysconfig/static-routes.
	Use of 
linuxconf
        and 
netcfg to edit routes.
	(Use of graphical tools is discouraged by this book.)
 - -
 - Forwarding concepts. Concepts of forwarding other
        protocols: X.25, frame-relay, ISDN,
	and PPP. (By ``concepts of'' I take it to mean
	that mere knowledge of these features is sufficient. See also Chapter 41.)
 - -
 - 
ipchains and ruleset concepts. Adding, deleting,
        listing, flushing rules. Forwarding, masquerading.
        Protocol-specific kernel modules (see the Firewall-HOWTO).
 - -
 - High availability concepts. Concepts of 
lvs,
        
pulse, 
nanny, config files, and
        web-based configuration. Piranha, failover concepts. (A conceptual understanding again.)
 - -
 - High performance clustering concepts.  Parallel virtual
        machine for computational research (conceptual understanding only).
 - -
 - Troublshooting:
	Networking (Chapter 25), X (Chapter 43), booting
	(Chapter 31), DNS (Chapters 27 and 40),
	authentication (Chapter 11),
        file system corruption (Section 19.5).
 - -
 - 
mkbootdisk and rescue floppy
	concepts. Use of the rescue disk environment and available commands (see 
mkbootdisk(8)).
 
RH220 is the networking module. It covers services sparsely,
possibly intending that the student learn only the bare bones
of what is necessary to configure a service.
    A treatment of 
bind, analogous to Topic 1.13,
    Obj 5 of LPI (page 
). Expects
    exhaustive understanding of the Domain Name System, an
    understanding of 
SOA, 
NS, 
A,
    
CNAME, 
PTR,
    
MX and 
HINFO
    records, ability to create master domain servers from scratch,
    caching-only servers, and round-robin load sharing configuration
    (Chapter 40).
    Overview of SMB services and concepts. Configuring Samba
    for file and print sharing. Using Samba client tools.
    Using 
linuxconf and 
swat.
    Editing 
/etc/smb.conf.
    Understanding types of shares. Support Wins. Setting authentication
    method. Using client utilities (Chapter 39).
    Conceptual understanding of NIS. NIS master
    and slave configure.
    Use of client utilities. LDAP concepts. OpenLDAP package,
    
slapd, 
ldapd,
    
slurpd, and config files (see the NIS-HOWTO).
    Understanding of mail spooling and transfer. Understanding the
    purpose of all 
sendmail config files. Editing config file
    for simple client (i.e., forwarding) configuration. Editing
    
/etc/sendmail.mc,
    
/etc/mail/virtusertable,
    
/etc/mail/access. Restricting relays. Viewing log files.
    Creating simple 
.procmail folder and email redirectors.
    (Chapter 30. Also see The Sendmail FAQ <http://www.sendmail.org/faq/>
    as well as 
procmail(1), 
procmailrc(6), and 
procmailex(5).)
    Configuring virtual hosts. Adding MIME types. Manipulating
    directory access and directory aliasing. Allowing restricting
    of CGI access. Setting up user and password databases.
    Understanding important modules (Chapter 36).
    Setting up a basic 
pppd server. Adding dial-in user accounts.
    Restricting users. Understanding 
dhcpd and BOOTP config files and
    concepts. Configuring with 
netcfg, 
netconfig, or
    
linuxconf. Using 
pump. Editing
    
/etc/dhcpd.conf. (Chapter 41. See also the DHCP-HOWTO.)
RH250 is the security module. It goes through basic administration
from a security perspective.
    Understanding security requirements. Basic terminology:
    hacker, cracker, denial of service,
    virus, trojan horse, worm. Physical
    security and security policies (Chapter 44).
    Understanding user accounts concepts, restricting access based on
    groups. Editing 
pam config files. 
/etc/nologin;
    editing 
/etc/security/ files.
    Using console group, 
cug;
    configuring and using 
clobberd and 
sudo.
    Checking logins in log files. Using 
last
    (Chapters 11 and 44). 
    Exhaustive treatment of groups and permissions.
    
chattr and 
lsattr commands.
    Use of 
find to locate permission problems.
    Use of 
tmpwatch. Installation of 
tripwire.
    Managment of NFS exports for access control (Chapters
    14, 28, and 44).
    Encryption terms: Public/Private Key,
    GPG, one-way hash, MD5.
    
xhost, 
xauth.
    
ssh concepts and features.
    Password-cracking concepts (Section 11.3 and
    Chapter 12).
    Use PAM to set resource limits (Section 11.7.5).
    Monitor process memory
    usage and CPU consumption; 
top, 
gtop,
    
kpm, 
xosview,
    
xload, 
xsysinfo.
    
last, 
ac, 
accton,
    
lastcomm (Chapter 9).
    Monitor logs with 
swatch (see 
swatch(5) and 
swatch(8)).
    
ipchains and ruleset concepts. Adding, deleting, listing,
    flushing rules. Forwarding, many-to-one and one-to-one
    masquerading. Kernels options for firewall support. Static and
    dynamic routing with concepts (see the Firewall-HOWTO).
    
/etc/sysconfig/static-routes.
    Use of 
linuxconf and
    
netcfg to edit routes.
    
tcp_wrappers (Chapter 29).
    Concepts of 
nessus, SAINT,
    SARA, SATAN. Concepts of 
identd.
    Use of 
sniffit, 
tcpdump,
    
traceroute,
    
ping -f, 
ethereal, 
iptraf,
    
mk-ftp-stats,
    
lurkftp, 
mrtg,
    
netwatch, 
webalizer,
    
trafshow. (These tools may be researched on the web.)
 
 
 
  
 Next: D. LINUX Advocacy FAQ
 Up: rute
 Previous: B. LPI Certification Cross-Reference
     Contents