RHCSA-Red Hat Certified System Administrator Training Course

    Red Hat courses can help you acquire the required skills for using the open-source Linux operating system. We train you to build hybrid cloud strategies and provide solut...

    ₹ 35000

    ₹ 40000

    13% off

    SHARE
    Baroda Institute of Technology
    ₹35000  40000

    13% off

    This includes following
    •  160 Hours
    •  Completion certificate : Yes
    •  Language : Hinglish
    Red Hat courses can help you acquire the required skills for using the open-source Linux operating system. We train you to build hybrid cloud strategies and provide solutions created alongside well-known cloud providers which enable you to run any app in any environment and on any cloud. The course will teach the fundamentals of technologies with hands-on labs. This will enable you to successfully use the concerned products. Red Hat System Administration I (RH124) - RHEL 8 training course is intended for professionals without previous Linux system administration experience. This course is based on Red Hat Enterprise Linux 8 and covers the Linux administration skills such as key command-line concepts and enterprise-level tools by focusing on core administration tasks. Red Hat System Administration II (RH134) – RHEL 8 training course is intended for IT professionals who have taken Red Hat System Administration I (RH124). 

        Live Class Practical Oriented Training

        Timely Doubt Resolution

        Dedicated Student Success Mentor

        Certification & Job Assistance

        Free Access to Workshop & Webinar

        No Cost EMI Option

        Configuring Network, Administering User Accounts, Tuning and Maintaining the Kernel

        Administering Simple Partitions & Filesystems, Using Filesystem Access Control Lists

        Review the system log files and journal for issues, Troubleshoot problems and analyze systems with Red Hat Insights

        Understanding Command-Line Process Management, Deploying and Securing File-Sharing Services

        Administering Virtual Machines, Getting Help in a Graphical Environment, Administering SELinux

        Administering System Resources, Installing and Managing Software Administering Remote Systems

        Manage storage devices, logical volumes, and file systems, Manage security and system access

        Remotely manage systems with SSH and the Web Console, Control the boot process and system services

       RH-124 Red Hat System Administration-I

       RH-134 Red Hat System Administration-II

       EX-200 Red Hat Certified System Administrator (RHCSA)

    •   Live Lecture 1-17 
       
      
      This course provides a foundation for students wishing to become full-time Linux system administrators by introducing key command-line concepts and other enterprise-level tools. RH124 is designed for IT professionals without previous Linux administration experience. The course provides students with Linux administration "survival skills" by focusing on core administration tasks. You will learn how to apply command-line concepts and enterprise-level tools, starting you on your journey toward becoming a full-time Linux system administrator. This path continues with the follow-on course, Red Hat System Administration-II (RH-134)
      
       
      
      Lecture-1 Get started with Red Hat Enterprise Linux 
      ·       Describe and define open source, Linux distributions, and Red Hat Enterprise Linux.
      
      Lecture 2: Access the command line 
      ·       Log into a Linux system and run simple commands using the shell.
      
      Lecture 3: Manage files from the command line 
      ·       Copy, move, create, delete, and organize files while working from the bash shell.
      
      Lecture 4: Get help in Red Hat Enterprise Linux 
      ·       Resolve problems by using local help systems
      
      Lecture 5 Create, view, and edit text files 
      ·       Manage text files from command output or in a text editor.
      
      Lecture 6: Manage local users and groups 
      ·       Create, manage, and delete local users and groups, as well as administer local password policies.
      
      Lecture 7: Control access to files 
      ·       Set Linux file system permissions on files and interpret the security effects of different permission settings.
      
      Lecture 8: Monitor and manage Linux processes 
      ·       Evaluate and control processes running on a Red Hat Enterprise Linux system.
      
      Lecture 9: Control services and daemons 
      ·       Control and monitor network services and system daemons using systemd.
      
      Lecture 10: Configure and secure SSH 
      ·       Configure secure command line service on remote systems, using OpenSSH.
      
      Lecture 11: Analyze and store logs 
      ·       Locate and accurately interpret logs of system events for troubleshooting purposes.
      
      Lecture 12: Manage networking 
      ·       Configure network interfaces and settings on Red Hat Enterprise Linux servers.
      
      Lecture 13: Archive and transfer files 
      ·       Archive and copy files from one system to another.
      
      Lecture 14: Install and update software 
      ·       Download, install, update, and manage software packages from Red Hat and yum package repositories.
      
      Lecture 15: Access Linux files systems 
      ·       Access, inspect, and use existing file systems on storage attached to a Linux server.
      
      Lecture 16: Analyze servers and get support 
      ·       Investigate and resolve issues in the web-based management interface, getting support from Red Hat to help solve problems.
      
      Lecture 17: Comprehensive review 
      ·       Review the content covered in this course by completing hands-on exercises
    •   Live Lecture 18-30 
      This course, designed for students who have completed RH124, goes deeper into enterprise Linux administration, including file systems and partitioning, logical volumes, SELinux, firewalling, and troubleshooting. The course goes deeper into core Linux system administration skills in storage configuration and management, installation and deployment of Red Hat® Enterprise Linux®, management of security features such as SELinux, control of recurring system tasks, management of the boot process and troubleshooting, basic system tuning, and command-line automation and productivity. .
      
      Lecture 18: Improve command line productivity 
      ·       Run commands more efficiently by using advanced features of the Bash shell, shell scripts, and various utilities provided by Red Hat Enterprise Linux.
      
      Lecture 19: Schedule future tasks 
      ·       Schedule commands to run in the future, either one time or on a repeating schedule.
      
      Lecture 20: Tune system performance 
      ·       Improve system performance by setting tuning parameters and adjusting scheduling priority of processes.
      
      Lecture 21: Control access to files with ACLs 
      ·       Interpret and set access control lists (ACLs) on files to handle situations requiring complex user and group access permissions.
      
       
      
      Lecture 22: Manage SELinux security 
      ·       Protect and manage the security of a server by using SELinux.
      
      Lecture 23: Manage basic storage 
      ·       Create and manage storage devices, partitions, file systems, and swap spaces from the command line.
      
       
      
      Lecture 24: Manage logical volumes 
      ·       Create and manage logical volumes containing file systems and swap spaces from the command line.
      
       
      
      Lecture 25: Implement advanced storage features 
      ·       Manage storage using the Stratis local storage management system and use VDO volumes to optimize storage space in use.
      
       
      
      Lecture 26: Access network-attached storage 
      ·       Use the NFS protocol to administer network-attached storage.
      
      Lecture 27: Control the boot process 
      ·       Manage the boot process to control services offered and to troubleshoot and repair problems.
      
      Lecture 28: Manage network security 
      ·       Control network connections to services using the system firewall and SELinux rules.
      
      Lecture 29: Install Red Hat Enterprise Linux 
      ·       Install Red Hat Enterprise Linux on servers and virtual machines.
      
      Lecture 30: Run Containers 
      ·       Obtain, run, and manage simple, lightweight services as containers on a single Red Hat Enterprise Linux server.
    •   RHCSA exam candidates should be able to accomplish the tasks below without assistance. These have been grouped into several categories.
      
      ·         Understand and use essential tools
      
      ·         Access a shell prompt and issue commands with correct syntax
      
      ·         Use input-output redirection (>, >>, |, 2>, etc.)
      
      ·         Use grep and regular expressions to analyze text
      
      ·         Access remote systems using SSH
      
      ·         Log in and switch users in multiuser targets
      
      ·         Archive, compress, unpack, and uncompress files using tar,
      
             star, gzip, and bzip2
      
      ·         Create and edit text files
      
      ·         Create, delete, copy, and move files and directories
      
      ·         Create hard and soft links
      
      ·         List, set, and change standard ugo/rwx permissions
      
      ·         Locate, read, and use system documentation including man,
      
             info, and files in /usr/share/doc
      
      ·         Create simple shell scripts
      
      ·         Conditionally execute code (use of: if, test, [], etc.)
      
      ·         Use Looping constructs (for, etc.) to process file,
      
             command line input
      
      ·         Process script inputs ($1, $2, etc.)
      
      ·         Processing output of shell commands within a script
      
      ·         Processing shell command exit codes
      
      ·         Operate running systems
      
      ·         Boot, reboot, and shut down a system normally
      
      ·         Boot systems into different targets manually
      
      ·         Interrupt the boot process in order to gain access to a system
      
      ·         Identify CPU/memory intensive processes and kill processes
      
      ·         Adjust process scheduling
      
      ·         Manage tuning profiles
      
      ·         Locate and interpret system log files and journals
      
      ·         Preserve system journals
      
      ·         Start, stop, and check the status of network services
      
      ·         Securely transfer files between systems
      
      ·         Configure local storage
      
      ·         List, create, delete partitions on MBR and GPT disks
      
      ·         Create and remove physical volumes
      
      ·         Assign physical volumes to volume groups
      
      ·         Create and delete logical volumes
      
      ·         Configure systems to mount file systems at boot by
      
             universally unique ID (UUID) or label
      
      ·         Add new partitions and logical volumes, and swap to a
      
             system non-destructively
      
      ·         Create and configure file systems
      
      ·         Create, mount, unmount, and use vfat, ext4, and xfs file systems
      
      ·         Mount and unmount network file systems using NFS
      
      ·         Extend existing logical volumes
      
      ·         Create and configure set-GID directories for collaboration
      
      ·         Configure disk compression
      
      ·         Manage layered storage
      
      ·         Diagnose and correct file permission problems
      
      ·         Deploy, configure, and maintain systems
      
      ·         Schedule tasks using at and cron
      
      ·         Start and stop services and configure services to
      
             start automatically at boot
      
      ·         Configure systems to boot into a specific target automatically
      
      ·         Configure time service clients
      
      ·         Install and update software packages from Red Hat Network,
      
             a remote repository, or from the local file system
      
      ·         Work with package module streams
      
      ·         Modify the system bootloader
      
      ·         Manage basic networking
      
      ·         Configure IPv4 and IPv6 addresses
      
      ·         Configure hostname resolution
      
      ·         Configure network services to start automatically at boot
      
      ·         Restrict network access using firewall-cmd/firewall
      
      ·         Manage users and groups
      
      ·         Create, delete, and modify local user accounts
      
      ·         Change passwords and adjust password aging for local user
      
             accounts
      
      ·         Create, delete, and modify local groups and group memberships
      
      ·         Configure superuser access
      
      ·         Manage security
      
      ·         Configure firewall settings using firewall-cmd/firewalld
      
      ·         Create and use file access control lists
      
      ·         Configure key-based authentication for SSH
      
      ·         Set enforcing and permissive modes for SELinux
      
      ·         List and identify SELinux file and process context
      
      ·         Restore default file contexts
      
      ·         Use boolean settings to modify system SELinux settings
      
      ·         Diagnose and address routine SELinux policy violations
      
      ·         Manage containers
      
      ·         Find and retrieve container images from a remote registry
      
      ·         Inspect container images
      
      ·         Perform container management using commands such as
      
             podman and skopeo
      
      ·         Perform basic container management such as running, starting,
      
             stopping, and listing running containers
      
      ·         Run a service inside a container
      
      ·         Configure a container to start automatically as a systemd service
      
      ·         Attach persistent storage to a container
    Basic Computer Knowledge.
    The course offers a variety of online training options, including: • Live Virtual Classroom Training: Participate in real-time interactive sessions with instructors and peers. • 1:1 Doubt Resolution Sessions: Get personalized assistance and clarification on course-related queries. • Recorded Live Lectures*: Access recorded sessions for review or to catch up on missed classes. • Flexible Schedule: Enjoy the flexibility to learn at your own pace and according to your schedule.
    Live Virtual Classroom Training allows you to attend instructor-led sessions in real-time through an online platform. You can interact with the instructor, ask questions, participate in discussions, and collaborate with fellow learners, simulating the experience of a traditional classroom setting from the comfort of your own space.
    If you miss a live session, you can access recorded lectures* to review the content covered during the session. This allows you to catch up on any missed material at your own pace and ensures that you don't fall behind in your learning journey.
    The course offers a flexible schedule, allowing you to learn at times that suit you best. Whether you have other commitments or prefer to study during specific hours, the course structure accommodates your needs, enabling you to balance your learning with other responsibilities effectively. *Note: Availability of recorded live lectures may vary depending on the course and training provider.
    Education Provider
    Baroda Institute Of Technology - Training Program

    BIT (Baroda Institute Of Technology) Is A Training And Development Organization Catering To The Learning Requirements Of Candidates Globally Through A Wide Array Of Services. Established In 2002. BIT Strength In The Area Is Signified By The Number Of Its Authorized Training Partnerships. The Organization Conducts Trainings For Microsoft, Cisco , Red Hat , Oracle , EC-Council , Etc. Domains / Specialties Corporate Institutional Boot Camp / Classroom Online – BIT Virtual Academy Skill Development Government BIT’s Vision To Directly Associate Learning With Career Establishment Has Given The Right Set Of Skilled Professionals To The Dynamic Industry. Increased Focus On Readying Candidates For On-the-job Environments Makes It A Highly Preferred Learning Provider. BIT Is Valued For Offering Training That Is At Par With The Latest Market Trends And Also Match The Potential Of Candidates. With More Than A Decade Of Experience In Education And Development, The Organization Continues To Explore Wider Avenues In Order To Provide Learners A Platform Where They Find A Solution For All Their Up- Skilling Needs!

    Graduation
    2002
    Data Sciences

    More Courses by : Baroda Institute of Technology


    Baroda Institute of Technology
    ₹35000  40000

    13% off

    This includes following
    •  160 Hours
    •  Completion certificate : Yes
    •  Language : Hinglish

    More Courses by : Baroda Institute of Technology