Understanding what a Linux distribution is and determining which one is best for you
Learning how to use basic file management commands
Understanding basic administration concepts such as users and groups
Changing file ownership and permissions
Configuring your system for basic usage
Installing and working with rpm packages
Networking
Section Objectives
Understanding the different protocols that are part of the TCP/IP protocol suite such as TCP, IP, UDP, and ICMP
Learning the fundamental, configuration variables for TCP/IP networks such as IP addresses, IP subnets, subnet masks, etc.
Setting up, configuring, and connecting a Linux computer to a TCP/IP network
Linux Development Environment
Section Objectives
Understanding the development tools available on a Linux system
Writing shell scripts and using scripting languages such as Perl and Python
Understanding, installing, and upgrading shared libraries
Compiling source
Kernel
Section Objectives
Understanding what the actual Linux kernel is
Understanding what the Linux kernel version number means
Configuring and compiling a custom kernel
Patching the kernel
Compiling and loading Linux kernel modules
Administration: Automation, Startup, Maintenance
Section Objectives
Controlling processes by adjusting their execution priority, terminating them, and sending them other signals
Determining which daemons are running and what their purpose is
Administering the X Windowing System including setting up the X Server, displaying remote clients on your display, and configuring access control for your display
Automating processes with cron and at
Network Services
Section Objectives
Setting up a basic Apache HTTP Server
Understanding the differences between the popular ftp servers and be able to set them up
Setting up Samba clients and servers
Setting up a basic DNS server
Understanding differences between different mail servers and be able to do basic setup
Security
Section Objectives
Setting up user authentication and making the system more secure using PAM and shadow passwords
Finding out which TCP/IP ports are open, which services are responding to requests on those ports, and detecting vulnerabilities
Using TCP/IP wrappers and firewall software to filter packets
Choosing versions of network daemons and clients that are more secure
Keeping up to date on the latest security vulnerabilities