RHCSA Course Duration:40 Hrs
Course Details
Red Hat Certified System Administration I (RH124) And II (RH134)
The first of two courses covering the core system administration tasks needed to manage Red Hat Enterprise Linux servers
Red Hat System Administration I (RH124) equips you with Linux® administration “survival skills” by focusing on foundational Linux concepts and core tasks. You will learn how to apply command-line concepts and enterprise-level tools, starting you on your journey toward becoming a full-time Linux system administrator. This path continues with the follow-on course, Red Hat System Administration II (RH134).
This course is based on Red Hat® Enterprise Linux 8.
PREREQUISITES:
- are no formal prerequisites for this course; however, previous operating system administration experience will be very beneficial.
- Knowledge about basic computer.
COURSE CONTENT SUMMARY:
- Introduction to the command line
- Managing physical storage
- Install and configure software components and services
- Establish network connections and control firewall restrictions
- Monitor and manage running processes
- Manage and secure files and file systems
- Administer users and groups
- Review the system log files and journal for issues
- Troubleshoot problems and analyze systems with Red Hat Insights
- Remotely manage systems with SSH and the Web Console
COURSE DETAILS: RED HAT SYSTEM ADMINISTRATION I (RH124):
Get started with Red Hat Enterprise Linux
Describe and define open source, Linux distributions, and Red Hat Enterprise Linux.
ACCESS THE COMMAND LINE
Log in to a Linux system and run simple commands using the shell.
MANAGE FILES FROM THE COMMAND LINE
Copy, move, create, delete, and organize files from the bash shell prompt.
GETTING HELP IN RED HAT ENTERPRISE LINUX
Resolve problems by using online help systems and Red Hat support utilities.
CREATE, VIEW, AND EDIT TEXT FILES
Create, view, and edit text files from command output or in an editor.
MANAGE LOCAL LINUX USERS AND GROUPS
Manage local Linux users and groups, and administer local password policies.
CONTROL ACCESS TO FILES WITH LINUX FILE SYSTEM PERMISSIONS
Set Linux file system permissions on files and interpret the security effects of different permission settings.
MONITOR AND MANAGE LINUX PROCESSES
Obtain information about the system, and control processes running on it.
CONTROL SERVICES AND DAEMONS
Control and monitor network services and system daemons using systemd.
CONFIGURE AND SECURE OPENSSH SERVICE
Access and provide access to the command line on remote systems securely using OpenSSH.
ANALYZE AND STORE LOGS
Locate and accurately interpret relevant system log files for troubleshooting purposes.
MANAGE RED HAT ENTERPRISE LINUX NETWORKING
Configure basic IPv4 networking on Red Hat Enterprise Linux systems.
ARCHIVE AND COPY FILES BETWEEN SYSTEMS
Archive files and copy them from one system to another.
INSTALL AND UPDATE SOFTWARE PACKAGES
Download, install, update, and manage software packages from Red Hat and yum package repositories.
ACCESS LINUX FILE SYSTEMS
Access and inspect existing file systems on a Red Hat Enterprise Linux system.
USE VIRTUALIZED SYSTEMS
Create and use Red Hat Enterprise Linux virtual machines with KVM and libvirt.
COMPREHENSIVE REVIEW
Practice and demonstrate the knowledge and skills learned in this course.
COURSE DETAILS: RED HAT SYSTEM ADMINISTRATION II (RH134):
AUTOMATE INSTALLATION WITH KICKSTART
Automate the installation of Red Hat Enterprise Linux systems with Kick start.
USE REGULAR EXPRESSIONS WITH GREP
Write regular expressions that, when partnered with grep, will allow you to quickly isolate or locate Content within text files.
CREATE AND EDIT TEXT FILES WITH VIM
Introduce the vim text editor, with which you can open, edit, and save text files.
SCHEDULE FUTURE LINUX TASKS
Schedule tasks to automatically execute in the future.
MANAGE PRIORITY OF LINUX PROCESSES
Influence the relative priorities at which Linux processes run.
CONTROL ACCESS TO FILES WITH ACCESS CONTROL LISTS (ACL)
Manage file security using POSIX access control lists.
MANAGE SELINUX SECURITY
Manage the Security Enhanced Linux (SELinux) behavior of a system to keep it secure in case of a network service compromise.
CONNECT TO NETWORK-DEFINED USERS AND GROUPS
Configure systems to use central identity management services.
ADD DISKS, PARTITIONS, AND FILE SYSTEMS TO A LINUX SYSTEM
Manage simple partitions and file systems.
MANAGE LOGICAL VOLUME MANAGEMENT (LVM) STORAGE
Manage logical volumes from the command line.
ACCESS NETWORKED ATTACHED STORAGE WITH NETWORK FILE SYSTEM (NFS)
Access (secure) NFS shares.
ACCESS NETWORKED STORAGE WITH SMB
Use autofs and the command line to mount and unmount SMB file systems.
CONTROL AND TROUBLESHOOT THE RED HAT ENTERPRISE LINUX BOOT PROCESS LIMIT NETWORK COMMUNICATION WITH FIREWALL
Configure a basic firewall.