RH 134 | Red Hat System Administration II

RH 134 | Red Hat System Administration II

3,400.00
Date:
Delivery Option:
Quantity:
Purchase Now

Course ID: D8011

Duration: 5 Days

Location: Flex - San Francisco or Live Online | Click here to schedule private course.

Overview

This course is designed as a follow-up to Red Hat System Administration 1, and builds on the concepts covered in that course, providing a more detailed and comprehensive teaching of Enterprise Linux. On completion of the course, students should be competent in:

  • Administering and troubleshooting file systems and partitioning

  • Logical volume management

  • Access control

  • Package management

Specific course modules include:

  • Command-line operations

  • Network configuration and troubleshooting

  • Managing file systems and logical volumes

  • Controlling user and file access

  • Installing and managing services and processes

+ Who Should Attend

This course is designed for students preparing to sit the RHCSA exam, and is ideally suited to those who have recently completed the Red Hat® System Administration I course. If you already have strong Linux command line skills, it might be worth investigating the RHCSA Rapid Track Course (RH200), which covers content in a more intensive format.

+ Course Outline

Automate installation with Kickstart

Automate the installation of Red Hat Enterprise Linux systems with Kickstart.

Use regular expressions with grep

Write regular expressions that, when partnered with grep, will allow you to quickly isolate or locate content within text files.

Create and Edit text files with vim

Introduce the vim text editor, with which you can open, edit, and save text files.

Schedule future Linux tasks

Schedule tasks to automatically execute in the future.

Manage priority of Linux processes

Influence the relative priorities at which Linux processes run.

Control access to files with access control lists (ACL)

Manage file security using POSIX access control lists.

Manage SELinux security

Manage the Security Enhanced Linux (SELinux) behavior of a system to keep it secure in case of a network service compromise.

Connect to network-defined users and groups

Configure systems to use central identity management services.

Add disks, partitions, and file systems to a Linux system

Manage simple partitions and file systems.

Manage logical volume management (LVM) storage

Manage logical volumes from the command line.

Access networked attached storage with network file system (NFS)

Access (secure) NFS shares.

Access networked storage with SMB

Use autofs and the command line to mount and unmount SMB file systems.

Control and troubleshoot the Red Hat Enterprise Linux boot process

Limit network communication with firewallConfigure a basic firewall.

Comprehensive review

Practice and demonstrate knowledge and skills learned in this course.

 

+ Prerequisites

Red Hat System Administration I (RH124)

+ Certifications

N/A