SlideShare a Scribd company logo
An Introduction to System
Administration
Chapter 1
Chapter Objectives
• Explore the world of the Sysadmin.
• List the duties of the Sysadmin.
• List the skill set required of the Sysadmin.
• List a few personality traits of a typical
Sysadmin.
What Is a Sysadmin?
• In a “small company” the Sysadmin may be
the entire information technology staff.
– The Sysadmin may do everything from
telephone, to fax, to computer management.
– Sysadmin may have to order supplies, deal
with users, develop software, repair
hardware, and laugh at the CEO’s jokes!
What Is a Sysadmin?
• In a large company the Sysadmin may be
one member of a large group.
– May be responsible for one aspect of the data
center operation.
• Programmers
• Database Administrators
• Network Administrators
• Operators
– May not even know what the CEO looks like.
Common Sysadmin Traits
• A Sysadmin is a customer service agent!
• The Sysadmin must be able to communicate with
technical and non-technical users.
• The Sysadmin should be patient, and have a sense
of humor.
• The Sysadmin must be able to solve difficult
technical problems.
• The Sysadmin must be able to work in a group
setting.
• The Sysadmin must document activities in order to
reproduce the results.
What Does a Sysadmin Do?
• Plan and manage the machine room environment
– design machine room; specify cooling, cabling,
power connections, and environmental controls (fire
alarm, security)
• Install and maintain operating system software,
application software, and patches.
• Determine hardware and software pre-requisites,
which patches to install, which services to provide,
and which services to disable.
What Does a Sysadmin Do?
• Schedule downtime to perform
upgrades/patches, and test devices and
schedule downtime to manage devices.
• Install and maintain user accounts; develop
acceptable use policy and login-name policy;
determine password change policies;
install/configure/manage name services; and
manage licenses.
• Determine disk quota, police/manage disk
space, and monitor log files.
What Does a Sysadmin Do?
• Train users on software and security.
• Ensure that users have access to documentation.
• Help users and provide help-desk support and
problem tracking system to answer user questions.
• Configure network services:
– printing, file sharing, name service.
– determine file sharing needs and printing policies.
– manage security for shared resources.
What Does a Sysadmin Do?
• Install/maintain system devices, hardware/drivers;
specify supported devices; determine spares
practices.
• Install/configure/manage web servers, configure
web access agents
• Configure and maintain business applications
– web agents
– e-mail
– calendar software
– order/problem tracking software
What Does a Sysadmin Do?
• Install/configure/manage e-mail software
– mail transfer agents.
– mail readers.
• Configure and manage system security
– security for business applications,
– read security mailing lists and CERT notifications,
– install/configure "firewall" software to limit intruder
access,
– collect evidence in case of successful intrusion and
clean up after intrusion
What Does a Sysadmin Do?
• Configure and maintain connectivity between
hosts
– monitor connectivity
– troubleshoot connectivity problems
– investigate complaints of poor response
What Does a Sysadmin Do?
• Configure and maintain system backups,
– determine backup strategy and policies, and
– configure backup software
– perform backups
– monitor backup logs
– check backup integrity
– determine disaster survival plans
– perform restores
What Does a Sysadmin Do?
• Troubleshoot and repair system problems;
and determine, locate, and repair/replace
problem components
• Document the system, and develop and
maintain documentation on local setup and
local policies
Skills Required
• Delegation and Time Management
• Ethics
• Ability to create/follow Policies and Procedures
• Desire to learn
• Customer Service Attitude
• Knowledge of technical aspects
– Hardware
– Software
– Problem Solving
Chapter Summary
• Sysadmins are often viewed as “a jack of all
trades”
• Sysadmins are customer service oriented.
• Sysadmins need to be able to communicate
clearly.
• Sysadmins need to be able to solve
problems
• Sysadmins need to be analytical thinkers.

More Related Content

Similar to Ch01.ppt

Security 101 for No- techies
Security 101 for No- techiesSecurity 101 for No- techies
Security 101 for No- techies
Brenton Johnson
 
Is jobs
Is jobsIs jobs
Annual OktCyberfest 2019
Annual OktCyberfest 2019Annual OktCyberfest 2019
Annual OktCyberfest 2019
Fahad Al-Hasan
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
Duressa Teshome
 
introduction to system administration
introduction to system administrationintroduction to system administration
introduction to system administration
gamme123
 
Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
Kabul Education University
 
Management Information System 2
Management Information System 2Management Information System 2
Management Information System 2
Jitendra Tomar
 
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect Match
McKonly & Asbury, LLP
 
suraj_Resume
suraj_Resumesuraj_Resume
suraj_Resume
Suraj Singh
 
Cyber Security in The Cloud
Cyber Security in The CloudCyber Security in The Cloud
Cyber Security in The Cloud
PECB
 
surya_resume2
surya_resume2surya_resume2
surya_resume2
Suryanarayan Patra
 
CYBER SECURITY.pdf
CYBER SECURITY.pdfCYBER SECURITY.pdf
CYBER SECURITY.pdf
Nidhi Rastogi
 
Dpa sam ltrk-marts2013_arturs_lazdekalns
Dpa sam ltrk-marts2013_arturs_lazdekalnsDpa sam ltrk-marts2013_arturs_lazdekalns
Dpa sam ltrk-marts2013_arturs_lazdekalns
ebuc
 
Dr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowDr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should Know
Nuuko, Inc.
 
Cybersecurity for Small Business
Cybersecurity for Small BusinessCybersecurity for Small Business
Cybersecurity for Small Business
Murray Security Services
 
L10 Architecture Considerations
L10 Architecture ConsiderationsL10 Architecture Considerations
L10 Architecture Considerations
Ólafur Andri Ragnarsson
 
MOUS13: Maintaining and Caring for your EPM Environment
MOUS13: Maintaining and Caring for your EPM EnvironmentMOUS13: Maintaining and Caring for your EPM Environment
MOUS13: Maintaining and Caring for your EPM Environment
Emtec Inc.
 
Corona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementCorona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat Management
RedZone Technologies
 
The Keys To A Successful Identity And Access Management Program: How Does You...
The Keys To A Successful Identity And Access Management Program: How Does You...The Keys To A Successful Identity And Access Management Program: How Does You...
The Keys To A Successful Identity And Access Management Program: How Does You...
Dell World
 
Government Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWinds
Government Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWindsGovernment Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWinds
Government Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWinds
SolarWinds
 

Similar to Ch01.ppt (20)

Security 101 for No- techies
Security 101 for No- techiesSecurity 101 for No- techies
Security 101 for No- techies
 
Is jobs
Is jobsIs jobs
Is jobs
 
Annual OktCyberfest 2019
Annual OktCyberfest 2019Annual OktCyberfest 2019
Annual OktCyberfest 2019
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
 
introduction to system administration
introduction to system administrationintroduction to system administration
introduction to system administration
 
Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
 
Management Information System 2
Management Information System 2Management Information System 2
Management Information System 2
 
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect Match
 
suraj_Resume
suraj_Resumesuraj_Resume
suraj_Resume
 
Cyber Security in The Cloud
Cyber Security in The CloudCyber Security in The Cloud
Cyber Security in The Cloud
 
surya_resume2
surya_resume2surya_resume2
surya_resume2
 
CYBER SECURITY.pdf
CYBER SECURITY.pdfCYBER SECURITY.pdf
CYBER SECURITY.pdf
 
Dpa sam ltrk-marts2013_arturs_lazdekalns
Dpa sam ltrk-marts2013_arturs_lazdekalnsDpa sam ltrk-marts2013_arturs_lazdekalns
Dpa sam ltrk-marts2013_arturs_lazdekalns
 
Dr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowDr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should Know
 
Cybersecurity for Small Business
Cybersecurity for Small BusinessCybersecurity for Small Business
Cybersecurity for Small Business
 
L10 Architecture Considerations
L10 Architecture ConsiderationsL10 Architecture Considerations
L10 Architecture Considerations
 
MOUS13: Maintaining and Caring for your EPM Environment
MOUS13: Maintaining and Caring for your EPM EnvironmentMOUS13: Maintaining and Caring for your EPM Environment
MOUS13: Maintaining and Caring for your EPM Environment
 
Corona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementCorona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat Management
 
The Keys To A Successful Identity And Access Management Program: How Does You...
The Keys To A Successful Identity And Access Management Program: How Does You...The Keys To A Successful Identity And Access Management Program: How Does You...
The Keys To A Successful Identity And Access Management Program: How Does You...
 
Government Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWinds
Government Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWindsGovernment Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWinds
Government Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWinds
 

Recently uploaded

A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
awadeshbabu
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
drwaing
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
ssuser36d3051
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
Mukeshwaran Balu
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
anoopmanoharan2
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
Exception Handling notes in java exception
Exception Handling notes in java exceptionException Handling notes in java exception
Exception Handling notes in java exception
Ratnakar Mikkili
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
rpskprasana
 

Recently uploaded (20)

A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
Exception Handling notes in java exception
Exception Handling notes in java exceptionException Handling notes in java exception
Exception Handling notes in java exception
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
 

Ch01.ppt

  • 1. An Introduction to System Administration Chapter 1
  • 2. Chapter Objectives • Explore the world of the Sysadmin. • List the duties of the Sysadmin. • List the skill set required of the Sysadmin. • List a few personality traits of a typical Sysadmin.
  • 3. What Is a Sysadmin? • In a “small company” the Sysadmin may be the entire information technology staff. – The Sysadmin may do everything from telephone, to fax, to computer management. – Sysadmin may have to order supplies, deal with users, develop software, repair hardware, and laugh at the CEO’s jokes!
  • 4. What Is a Sysadmin? • In a large company the Sysadmin may be one member of a large group. – May be responsible for one aspect of the data center operation. • Programmers • Database Administrators • Network Administrators • Operators – May not even know what the CEO looks like.
  • 5. Common Sysadmin Traits • A Sysadmin is a customer service agent! • The Sysadmin must be able to communicate with technical and non-technical users. • The Sysadmin should be patient, and have a sense of humor. • The Sysadmin must be able to solve difficult technical problems. • The Sysadmin must be able to work in a group setting. • The Sysadmin must document activities in order to reproduce the results.
  • 6. What Does a Sysadmin Do? • Plan and manage the machine room environment – design machine room; specify cooling, cabling, power connections, and environmental controls (fire alarm, security) • Install and maintain operating system software, application software, and patches. • Determine hardware and software pre-requisites, which patches to install, which services to provide, and which services to disable.
  • 7. What Does a Sysadmin Do? • Schedule downtime to perform upgrades/patches, and test devices and schedule downtime to manage devices. • Install and maintain user accounts; develop acceptable use policy and login-name policy; determine password change policies; install/configure/manage name services; and manage licenses. • Determine disk quota, police/manage disk space, and monitor log files.
  • 8. What Does a Sysadmin Do? • Train users on software and security. • Ensure that users have access to documentation. • Help users and provide help-desk support and problem tracking system to answer user questions. • Configure network services: – printing, file sharing, name service. – determine file sharing needs and printing policies. – manage security for shared resources.
  • 9. What Does a Sysadmin Do? • Install/maintain system devices, hardware/drivers; specify supported devices; determine spares practices. • Install/configure/manage web servers, configure web access agents • Configure and maintain business applications – web agents – e-mail – calendar software – order/problem tracking software
  • 10. What Does a Sysadmin Do? • Install/configure/manage e-mail software – mail transfer agents. – mail readers. • Configure and manage system security – security for business applications, – read security mailing lists and CERT notifications, – install/configure "firewall" software to limit intruder access, – collect evidence in case of successful intrusion and clean up after intrusion
  • 11. What Does a Sysadmin Do? • Configure and maintain connectivity between hosts – monitor connectivity – troubleshoot connectivity problems – investigate complaints of poor response
  • 12. What Does a Sysadmin Do? • Configure and maintain system backups, – determine backup strategy and policies, and – configure backup software – perform backups – monitor backup logs – check backup integrity – determine disaster survival plans – perform restores
  • 13. What Does a Sysadmin Do? • Troubleshoot and repair system problems; and determine, locate, and repair/replace problem components • Document the system, and develop and maintain documentation on local setup and local policies
  • 14. Skills Required • Delegation and Time Management • Ethics • Ability to create/follow Policies and Procedures • Desire to learn • Customer Service Attitude • Knowledge of technical aspects – Hardware – Software – Problem Solving
  • 15. Chapter Summary • Sysadmins are often viewed as “a jack of all trades” • Sysadmins are customer service oriented. • Sysadmins need to be able to communicate clearly. • Sysadmins need to be able to solve problems • Sysadmins need to be analytical thinkers.