** Upcoming Kubernetes training starting February 3rd 2024**. Contact 647-677-4055 to know more.

RHCSA Course Duration:40 Hrs


Course Details

Red Hat Certified System Administration I (RH124) And II (RH134)

The first of two courses covering the core system administration tasks needed to manage Red Hat Enterprise Linux servers

Red Hat System Administration I (RH124) equips you with Linux® administration “survival skills” by focusing on foundational Linux concepts and core tasks. You will learn how to apply command-line concepts and enterprise-level tools, starting you on your journey toward becoming a full-time Linux system administrator. This path continues with the follow-on course, Red Hat System Administration II (RH134).

This course is based on Red Hat® Enterprise Linux 8.

PREREQUISITES:

  • are no formal prerequisites for this course; however, previous operating system administration experience will be very beneficial.
  • Knowledge about basic computer.

COURSE CONTENT SUMMARY:

  • Introduction to the command line
  • Managing physical storage
  • Install and configure software components and services
  • Establish network connections and control firewall restrictions
  • Monitor and manage running processes
  • Manage and secure files and file systems
  • Administer users and groups
  • Review the system log files and journal for issues
  • Troubleshoot problems and analyze systems with Red Hat Insights
  • Remotely manage systems with SSH and the Web Console

COURSE DETAILS: RED HAT SYSTEM ADMINISTRATION I (RH124):

Get started with Red Hat Enterprise Linux

Describe and define open source, Linux distributions, and Red Hat Enterprise Linux.

ACCESS THE COMMAND LINE

Log in to a Linux system and run simple commands using the shell.

MANAGE FILES FROM THE COMMAND LINE

Copy, move, create, delete, and organize files from the bash shell prompt.

GETTING HELP IN RED HAT ENTERPRISE LINUX

Resolve problems by using online help systems and Red Hat support utilities.

CREATE, VIEW, AND EDIT TEXT FILES

Create, view, and edit text files from command output or in an editor.

MANAGE LOCAL LINUX USERS AND GROUPS

Manage local Linux users and groups, and administer local password policies.

CONTROL ACCESS TO FILES WITH LINUX FILE SYSTEM PERMISSIONS

Set Linux file system permissions on files and interpret the security effects of different permission settings.

MONITOR AND MANAGE LINUX PROCESSES

Obtain information about the system, and control processes running on it.

CONTROL SERVICES AND DAEMONS

Control and monitor network services and system daemons using systemd.

CONFIGURE AND SECURE OPENSSH SERVICE

Access and provide access to the command line on remote systems securely using OpenSSH.

ANALYZE AND STORE LOGS

Locate and accurately interpret relevant system log files for troubleshooting purposes.

MANAGE RED HAT ENTERPRISE LINUX NETWORKING

Configure basic IPv4 networking on Red Hat Enterprise Linux systems.

ARCHIVE AND COPY FILES BETWEEN SYSTEMS

Archive files and copy them from one system to another.

INSTALL AND UPDATE SOFTWARE PACKAGES

Download, install, update, and manage software packages from Red Hat and yum package repositories.

ACCESS LINUX FILE SYSTEMS

Access and inspect existing file systems on a Red Hat Enterprise Linux system.

USE VIRTUALIZED SYSTEMS

Create and use Red Hat Enterprise Linux virtual machines with KVM and libvirt.

COMPREHENSIVE REVIEW

Practice and demonstrate the knowledge and skills learned in this course.

COURSE DETAILS: RED HAT SYSTEM ADMINISTRATION II (RH134):

AUTOMATE INSTALLATION WITH KICKSTART

Automate the installation of Red Hat Enterprise Linux systems with Kick start.

USE REGULAR EXPRESSIONS WITH GREP

Write regular expressions that, when partnered with grep, will allow you to quickly isolate or locate Content within text files.

CREATE AND EDIT TEXT FILES WITH VIM

Introduce the vim text editor, with which you can open, edit, and save text files.

SCHEDULE FUTURE LINUX TASKS

Schedule tasks to automatically execute in the future.

MANAGE PRIORITY OF LINUX PROCESSES

Influence the relative priorities at which Linux processes run.

CONTROL ACCESS TO FILES WITH ACCESS CONTROL LISTS (ACL)

Manage file security using POSIX access control lists.

MANAGE SELINUX SECURITY

Manage the Security Enhanced Linux (SELinux) behavior of a system to keep it secure in case of a network service compromise.

CONNECT TO NETWORK-DEFINED USERS AND GROUPS

Configure systems to use central identity management services.

ADD DISKS, PARTITIONS, AND FILE SYSTEMS TO A LINUX SYSTEM

Manage simple partitions and file systems.

MANAGE LOGICAL VOLUME MANAGEMENT (LVM) STORAGE

Manage logical volumes from the command line.

ACCESS NETWORKED ATTACHED STORAGE WITH NETWORK FILE SYSTEM (NFS)

Access (secure) NFS shares.

ACCESS NETWORKED STORAGE WITH SMB

Use autofs and the command line to mount and unmount SMB file systems.

CONTROL AND TROUBLESHOOT THE RED HAT ENTERPRISE LINUX BOOT PROCESS LIMIT NETWORK COMMUNICATION WITH FIREWALL

Configure a basic firewall.