Go BackUNIX System Administration II

Synopsis
System Administration II presents UNIX system accounting, performance monitoring, device management, and UNIX security.

Audience
This course is for anyone who is new to UNIX or wants to expand what they already know about UNIX.

Time
8 hours, based on viewing all pages.

Product Code: UNXTC6
After completing System Administration II, the user should be able to:
 
Manage UNIX accounting systems
understand the factors that affect system performance
Optimize resources so that the system performs at its best
Set up, configure, and maintain devices
Evaluate security needs
Identify the tools used to improve a system's security

System Accounting
Describes UNIX system accounting and how it can assist in keeping track of users and processes.
 
Describing the UNIX accounting system
Utilizing the program initiation and shutdown features
Setting up and turning on the system accounting options.
Generating daily and summary accounting reports.

Performance Monitoring
Describes performance monitoring that enables system administrators, programmers, and users to examine UNIX system resources.
 
Understanding and comparing the factors that affect system performance.
Utilizing and optimizing the memory and network performance commands
Developing strategies to deal with performance problems
Using kernel tuning for enhanced system performance
Optimizing resources so that the system performs at its best.

Device Administration
Presents issues pertaining to the administration and management of hardware resources.
 
Utilizing, administering, and managing the Service Access Facility (SAF)
Creating and managing port monitors and port services
Connecting and managing printer resources
Connecting a PC to UNIX Systems
Setting up, connecting, and utilizing X terminals and X resources

UNIX System Security
Provides a broad overview of UNIX security concerns.
 
Identifying the various types of security attacks and vulnerable areas
Comparing and utilizing different user authentication methods
Setting up a security policy and where to find information
Identifying the tools needed to improve system security
Utilizing Firewalls and Bastion Hosts

This course is distributed with the UNIX Glossary.

 

Go Back