Sunday, January 24, 2016

Linux Foundation Certified System Administrator Domain and Competencies v.2.16

Domains and Competencies V2.16

ESSENTIAL COMMANDS - 25%
  • Identify the component of the Linux distribution that a file belongs to
  • Install Linux Distribution to physical media
  • Install Linux Distribution over a network
  • Install Linux Distribution into a virtual disk image
  • Log into graphical and text mode consoles
  • Search for files
  • Evaluate and compare the basic file system features and options
  • Compare text files
  • Compare binary files
  • Identify different types of files
  • Create and edit text files
  • Use input-output redirection (e.g. >, >>, |, 2>)
  • Analyze text using basic regular expressions
  • Access remote systems securely using CLI
  • Archive, compress, unpack, and uncompress files
  • Create, delete, copy, and move files and directories
  • Create hard and soft links
  • List, set, and change standard file permissions
  • Read, and use system documentation
  • Manipulate file content programmatically
  • Transfer files securely via the network
  • Manage access to the root account
  • Perform disk image management
  • Use version control tools
  • Run commands on many systems simultaneously

Operation of Running Systems - 20%

  • Boot, reboot, and shut down a system safely
  • Boot systems into different runlevels manually
  • Install, configure and troubleshoot the bootloader
  • Manage shared libraries
  • Change the priority of a process
  • Identify resource utilization by process
  • Locate and analyze system log files
  • Schedule tasks to run at a set date and time
  • Verify completion of scheduled jobs
  • Manipulate Linux system during the boot process
  • Manipulate Linux system during the recovery process
  • Support incident management for outages/trouble
  • Identify and resolve system performance bottlenecks and platform instability
  • Update hardware to provide required functionality and security
  • Update operating systems to provide required functionality and security
  • Update software to provide required functionality and security
  • Update the kernel and ensure the system is bootable
  • Verify the integrity and availability of hardware
  • Verify the integrity and availability of resources
  • Verify the integrity and availability of key processes
  • Change kernel runtime parameters, persistent and non-persistent
  • Use scripting to automate system maintenance tasks
  • Manage the startup process and services
  • List and identify SELinux/AppArmor file and process contexts
  • Produce and deliver reports on system use (processor, memory, disk, and network), outages, and user requests
  • Update packages from the network, a remote repository, or from the local file system
  • Configure and modify SELinux/AppArmor policies
  • Monitor security and conduct audits
  • Script automation tools to make work faster and more accurate
  • Develop and test disaster recovery plans
  • Maintain systems via configuration management tools
  • Train team members on new technology or changes to existing systems
  • Develop system disaster recovery tests
  • Install software from source

User and Group Management - 15%

  • Create, delete, and modify local user accounts
  • Create, delete, and modify local groups and group memberships
  • Manage system-wide environment profiles
  • Configure a client to use LDAP for user and group information
  • Configure a system to authenticate using Kerberos
  • Configure set-GID directories for collaboration
  • Manage template user environment
  • Configure user resource limits
  • Manage user processes
  • Configure PAM

Networking - 15%

  • Configure networking and hostname resolution statically or dynamically
  • Configure network services to start automatically at boot
  • Implement packet filtering
  • Configure firewall settings
  • Configure a system to perform Network Address Translation
  • Start, stop, and check the status of network services
  • Monitor network performance
  • Statically route IP traffic
  • Dynamically route IP traffic
  • Synchronize time using other network peers
  • Configure network traffic tunneling

Service Configuration - 10%

  • Configure a basic DNS server
  • Maintain a DNS zone
  • Configure a caching-only name server
  • Configure a caching-only name server to forward DNS queries
  • Configure an FTP server
  • Configure anonymous-only download on FTP servers
  • Provide/configure network shares via NFS
  • Provide/configure network shares via CIFS
  • Configure an smtp service
  • Restrict access to an smtp server
  • Configure a mail transfer agent (MTA) to accept inbound email from other systems
  • Configure an MTA to forward (relay) email through a smart host
  • Configure email aliases
  • Configure SSH servers and clients
  • Configure SSH-based remote access using public/private key pairs
  • Configure a DHCP server
  • Configure the HTTP proxy server
  • Restrict access to the HTTP proxy server
  • Configure an HTTP client to automatically use a proxy server
  • Configure an IMAP and IMAPS service
  • Configure host-based and user-based security for a service
  • Query and modify the behavior of system services at various run levels
  • Configure direct-attach and network printers
  • Configure an HTTP server
  • Configure HTTP server log files
  • Configure SSL with HTTP server
  • Set up name-based virtual web hosts
  • Deploy a basic web application
  • Restrict access to a web page
  • Configure time synchronization server
  • Synchronize time using other time synchronization peers
  • Configure a system to log to a remote system
  • Configure a PXE Boot server
  • Configure an LDAP server and schema 
  • Configure a system to accept logging from a remote system
  • Diagnose routine SELinux/AppArmor policy violations
  • Configure SELinux/AppArmor to support a service
  • Configure database server
  • Configure SELinux/AppArmor to confine a service

Virtualization - 5%

  • Configure a hypervisor to host virtual guests
  • Install Linux systems as virtual guests
  • Start, stop, modify the status of virtual machines
  • Access a VM console
  • Migrate a VM between two hosts
  • Configure systems to launch virtual machines at boot
  • Evaluate memory usage of virtual machines
  • Create light-weight virtualized guests via namespaces
  • Resize RAM or storage of VMs
  • Cloning and replicating VMs using images or snapshots

Storage Management - 10%

  • List, create, delete, and modify storage partitions
  • Create, migrate, and remove Physical Volumes
  • Assign Physical Volumes to Volume Groups
  • Create, modify and delete Logical Volumes
  • Extend existing Logical Volumes and filesystems
  • Create and configure encrypted partitions
  • Configure systems to mount file systems at or during boot
  • Configure and manage swap space
  • Add new partitions, and logical volumes
  • Create, mount, and unmount standard Linux file systems
  • Assemble partitions as RAID devices
  • Identify storage devices using block device attributes
  • Configure systems to mount standard, encrypted, and network file systems on demand
  • Create and manage filesystem Access Control Lists (ACLs)
  • Diagnose and correct file permission problems
  • Setup user and group disk quotas for filesystems
  • Restore default SELinux file contexts
  • Manage Linux file system features and flags
  • Configure remote block storage devices
  • Design and test backup/recovery strategies
  • Deploy, configure, and maintain high availability/clustering/replication
ref: https://training.linuxfoundation.org/upcoming-program-changes-for-the-lfcs-certification-exam

No comments:

Post a Comment