Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Introduction
- Overview of Rocky Linux for government use
- Understanding the relationship between Rocky Linux, CentOS, and Red Hat Enterprise Linux in a public sector context
- Installation methods and initial system setup for government systems
System Configuration and Maintenance
- User and group management for secure government operations
- File system administration and permissions to ensure data integrity and compliance
- Package management for consistent software updates and security patches
- Managing software repositories to maintain access to necessary tools and resources
System Services and Processes
- Managing services with systemd for reliable government service delivery
- Monitoring and controlling processes to ensure system efficiency and performance
- System logs and log management for enhanced security and audit capabilities
Networking in Rocky Linux
- Configuring networking interfaces to support government network requirements
- Firewall setup and management to protect against cyber threats
- Network troubleshooting and diagnostics to maintain connectivity and performance
Security and Access Control
- Implementing security best practices for government systems
- User authentication methods to ensure secure access to resources
- Securing SSH and remote access to prevent unauthorized entry
- Implementing SELinux (Security-Enhanced Linux) for advanced security controls
Storage Management
- Managing local storage devices and partitions for efficient data management
- File system types and management to optimize performance and reliability
- Logical Volume Management (LVM) for flexible and scalable storage solutions
Virtualization and Containers
- Introduction to virtualization for government applications
- Overview of containerization for modernizing government IT infrastructure
- Managing virtual machines and containers to support diverse workloads
System Backup and Recovery
- Backup strategies and tools to ensure data protection and continuity
- Restoring and recovering systems in the event of a failure or disaster
- Implementing disaster recovery plans to minimize downtime and data loss
Performance Monitoring and Tuning
- System performance monitoring to identify and address bottlenecks
- Performance tuning and optimization to enhance system efficiency and responsiveness
Troubleshooting
Summary and Next Steps
Requirements
- Familiarity with fundamental Linux concepts
- Basic understanding of networking principles
Audience
- System administrators for government
- IT professionals in the public sector
14 Hours
Testimonials (2)
experienced trainer
Monika Biskupska - Osrodek Przetwarzania Informacji - Panstwowy Instytut Badawczy
Course - Kubernetes Security Fundamentals (LFS460)
trainer has hands-on knowledge