RH-124
  • Introduction to Unix
  • Unix Architecture
  • Introduction to Linux
  • Linux Features
  • Basic commands
  • Using the GNOME desktop & KDE Desktop
  • Introduction to Bash
  • System Information Commands
  • Listing commands
  • Editor commands using VI or VIM, NANO,GEDIT
  • Scripting commands using AWK,SED,ECHO,WHICH
  • Linux Directory Hierarchy
  • File Components
  • Hard link, Block, directory, device files and soft link
  • Disk Management
  • Partition and types of Partition
  • Partitioning Using FDISK
  • Partition using Parted
  • File system
  • Mount and Unmount File system
  • Managing SWAP space
  • To boot the system to install Linux using GUI
  • User administration
  • Managing User and Group Accounts
  • User profile customization
  • Process Administration
  • Cron and At
  • Package administration Using RPM
  • File permission
  • Administration of quota management
  • Managing User and group quota
  • Boot process
  • Init
  • run levels
  • Booting an alternate kernel
  • Network related commands
  • Assigning the IP Address and hostname
  • Static and Dynamic Route Configuration
  • Bash Scripting and Tools
RH 135
  • Server – Client relationship
  • YUM server configuration
  • Handle Third-Party Software
  • DHCP server configuration
  • The DHCP client
  • DNS server configuration
  • Record of DNS
  • Zones of DNS
  • Apache or web server Configuration
  • NFS server configuration
  • NIS server configuration
  • Configuring NIS Client
  • Synchronize time using NTP peers
  • Samba server configuration or CIFS
  • Squid server configuration
  • Blocking the particular Hosts
  • Mail server configuration
  • Configuring FTP service
RH 255
  • Remote login connection
  • Secure access to remote GNOME desktop
  • Configuring CUPS
  • Introduction to LDAP server
  • Host Based and Network Based Security
  • IP tables
  • Configuring NAT
  • SSH Port Forwarding
  • IP forwarding
  • SELINUX
  • System monitoring and Logs
  • Network Mapping Using NMAP
  • Linux kernel
  • Web Server Security
  • Managing Flexible storage with Logical Volume Manager
  • Redundant array of inexpensive disks
  • Types and levels of RAID
  • Centralized and secure storage
  • KVM virtualization
  • KICKSTART INSTALLATION
  • Linux Troubleshooting
  • Root password recovery
  • Trouble shooting the Boot process
  • System Recovery Techniques
  • GRUB mode recovery both single user mode and rescue mode

Duration: 2.5 Month

REQUEST A FREE QUOTE

Curriculum of all the programs are as per International Standards set by Principles of the resective technology. 
To join for any of the courses or for further details reach us @ IIHT-VPN or call us at 9677055562 / 044-43069570.

  • International Standard Syllabus.
  • International Standard Materials.
  • State of the Art Infrastructure.
  • Qualified & Service Minded Mentors i.e, Trainers.
  • Convenient Timings (exclusive Day, Evening, Weekend batches for Employed & College Students).
  • Real-Time, Practicals, Presentations, Videos, Debates, Assignments, Case Study, based Trainings.
  • Unlimited Evaluations during training sessions.
  • Unlimited Lab Access.
  • Life Long Support System.
  • Exclusive Communication & Attitude Development training.
  • Exhaustive Interview Training.
  • Unique Employability Training.
  • Special Apperance of Real-Time Experts for considerable duration, at the end of course.
  • Unlimited Interviews.
  • After-Interview Training at the end of each interview.
  • Assured Placement Assistance for continous 3 positions of the Job.
  • Technical Assistance on the Real Time Scenarios, even after completing the course and got Placed.
  • Life long Technology, Industry, Placement Updates.
  • Connectivity to the Industrial Experts for rich Technical aid for entire life time.
  • Access to Online – technology, Career Resources.
  • Exclusive International Certification Preparation Training.
  • Convenient transfer facility to 220+ branches across the Globe
Top