Course Objective
This course is for individuals who have completed Red Hat® System Administration I (RH124). It focuses on the key tasks needed to become a full-time administrator of Red Hat Enterprise Linux 7. Attending both Red Hat® System Administration I (RH124) and Red Hat® System Administration II (RH134) can help you in your preparation for the Red Hat Certified System Administrator Exam (EX200).
Note: Global Knowledge and Red Hat do not guarantee that anyone who takes one or all of the courses in the Red Hat certification program will pass a Red Hat exam. On-the-job experience, in combination with high-quality training, is the best way to build skills and prepare for a Red Hat exam. The exam itself is a hands-on learning experience, and many of those who do not pass on the first try come away with knowledge of what they need to work on to pass the exam on a re-take.
WHO NEEDS TO ATTEND
-
Individuals who have completed Red Hat® System Administration I (RH124)
-
Individuals that have not taken a previous Red Hat course are encouraged to take either Red Hat® System Administration I (RH124) if they are new to Linux, or the RHCSA® Rapid Track Course with Exam (RH200) if they are experienced with enterprise Linux administration
WHAT YOU'LL LEARN
-
Installation using Kickstart
-
Managing filesystems and logical volumes
-
Managing scheduled jobs
-
Accessing network filesystems
-
Managing SELinux
-
Controlling firewalling
-
Troubleshooting
Outline for this course
-
Automate installation with Kickstart
Automate the installation of Red Hat Enterprise Linux systems with Kickstart.
-
Use regular expressions with grep
Write regular expressions that, when partnered with grep, will allow you to quickly isolate or locate content within text files.
-
Create and Edit text files with vim
Introduce the vim text editor, with which you can open, edit, and save text files.
-
Schedule future Linux tasks
Schedule tasks to automatically execute in the future.
-
Manage priority of Linux processes
Influence the relative priorities at which Linux processes run.
-
Control access to files with access control lists (ACL)
Manage file security using POSIX access control lists.
-
Manage SELinux security
Manage the Security Enhanced Linux (SELinux) behavior of a system to keep it secure in case of a network service compromise.
-
Connect to network-defined users and groups
Configure systems to use central identity management services.
-
Add disks, partitions, and file systems to a Linux system
Manage simple partitions and file systems.
-
Manage logical volume management (LVM) storage
Manage logical volumes from the command line.
-
Access networked attached storage with network file system (NFS)
Access (secure) NFS shares.
-
Access networked storage with SMB
Use autofs and the command line to mount and unmount SMB file systems.
-
Control and troubleshoot the Red Hat Enterprise Linux boot process
-
Limit network communication with firewall
Configure a basic firewall.
-
Comprehensive review