Red Hat Engineer Training Course

    Red Hat Certified Master's Program courses can help you acquire the required skills for using the open-source Linux operating system. We train you to build hybrid cloud s...

    ₹ 60000

    ₹ 65000

    8% off

    SHARE
    Baroda Institute of Technology
    ₹60000  65000

    8% off

    This includes following
    •  270 Hours
    •  Completion certificate : Yes
    •  Language : Hinglish
    Red Hat Certified Master's Program courses can help you acquire the required skills for using the open-source Linux operating system. We train you to build hybrid cloud strategies and provide solutions created alongside well-known cloud providers which enable you to run any app in any environment and on any cloud. The course will teach the fundamentals of technologies with hands-on labs. This certification will set you up for the performance based certification exam by Red Hat that is proposed to show your knowledge, skills and experience as a senior system administrator that is responsible for Red Hat Enterprise Linux systems. Red Hat System Administration I (RH124) - RHEL 8 training course is intended for professionals without previous Linux system administration experience. This course is based on Red Hat Enterprise Linux 8 and covers the Linux administration skills such as key command-line concepts and enterprise-level tools by focusing on core administration tasks. 

        Live Class Practical Oriented Training

        Timely Doubt Resolution

        Dedicated Student Success Mentor

        Certification & Job Assistance

        Free Access to Workshop & Webinar

        No Cost EMI Option

        Configuring Network, Administering User Accounts, Tuning and Maintaining the Kernel

        Administering Virtual Machines, Getting Help in a Graphical Environment, Administering SELinux

        Review the system log files and journal for issues, Troubleshoot problems and analyze systems with Red Hat Insights, Rem...

        Be able to perform all tasks expected of a Red Hat Certified System Administrator

        Create and update inventories of managed hosts and manage connections to them. Automate administration tasks with Ansib...

        Administering Simple Partitions and Filesystems, Using Filesystem Access Control Lists, Understanding Command-Line Proce...

        Administering System Resources, Installing and Managing Software Administering Remote Systems, Deploying and Securing Fi...

        Manage storage devices, logical volumes, and file systems, Manage security and system access, Control the boot process a...

        Understand core components of Ansible, Install and configure an Ansible control node

        Protect sensitive data used by Ansible with Ansible Vault. Reuse code and simplify playbook development with Ansible ro...

       CompTIA Network+(007)

       RHCSA-Red Hat Certified System Administrator

       RHCE-Red Hat Certified Engineer

    •   Lecture 1: Explain the purposes and uses of ports and protocols 
      ·         Protocols and ports
      
      ·         Protocol types
      
      ·         Connection-oriented vs. connectionless
      
      Lecture 2: Explain devices, applications, protocols and services at their appropriate OSI layers 
      ·         Layer 1-   Physical
      
      ·         Layer 2 - Data link
      
      ·         Layer3 - Network
      
      ·         Layer4 – Transport
      
      ·         Layers - Session
      
      ·         Layer6 – Presentation
      
      ·         Layer7 -Application   
      
      Lecture 3: Explain the concepts and characteristics of routing and switching 
      ·         Properties of network traffic
      
      ·         Segmentation and interface properties
      
      ·         Routing
      
      ·         1Pv6 concepts
      
      ·         Performance concepts
      
      ·         NAT/PAT
      
      ·         Port forwarding
      
      ·         Access control list
      
      ·         Distributed switching
      
      ·         Packet-switched vs. circuit
      
      ·         switched network
      
      ·         Software-defined networking
      
      Lecture 4: Given a scenario, configure the appropriate IP 
      ·        Private  vs. public
      
      ·        Loop back and reserved
      
      ·        Default  gateway
      
      ·        Virtual  IP
      
      ·        Subnet  mask
      
      ·        Subnetting
      
      ·        Address assignments
      
      Lecture 5: Compare and contrast the characteristics of network topologies, types and technologies 
      ·        Wired  topologies
      
      ·        Types  
      
      ·        Technologies  that  facilitate the Internet of Things (loT)
      
      ·        Wireless  topologies    
      
      Lecture 6: Given a scenario, implement the appropriate wireless technologies and configurations 
      ·        802.11   standards
      
      ·        Cellula
      
      ·        Frequencies
      
      ·        Speed and distance  requirements
      
      ·        Channel bandwidth
      
      ·        Channel bonding
      
      ·        MIMO/MU-MIMO
      
      ·        Unidirectional/omnidirectional
      
      ·        Site surveys   
      
      Lecture 7: Summarize cloud concepts and their purposes 
      ·        Types of services
      
      ·        Cloud delivery models
      
      ·        Connectivity methods
      
      ·        Security implications/considerations
      
      ·        Relationship between  local and cloud resources      
      
      Lecture 8: Explain the functions of network services 
      ·        DNS  service
      
      ·        DHCP  service
      
      ·        NTP
      
      ·        IPAM           
      
      Lecture 9: Given a scenario, deploy the appropriate cabling solution 
      ·        Media types
      
      ·        Plenum vs. PVC
      
      ·        Connector  types
      
      ·        Transceivers
      
      ·        Termination   points
      
      ·        Copper cable standards
      
      ·        Copper termination  standards
      
      ·        Ethernet  deployment   standards               
      
      Lecture 10: Given a scenario, determine the appropriate placement of networking devices on a network and install/configure them 
      ·        Firewall
      
      ·        Router
      
      ·        Switch
      
      ·        Hub    
      
      ·        Bridge
      
      ·        Modems
      
      ·        Wireless  access point
      
      ·        Media converter
      
      ·        Wireless  range extender
      
      ·        VoIP endpoint      
      
      Lecture 11: Explain the purposes and use cases for advanced networking devices 
      ·        Multilayer switch
      
      ·        Proxy server
      
      ·        NGFW/Layer 7 firewall
      
      ·        Wireless  controller
      
      ·        VPN concentrator
      
      ·        VoIP PBX
      
      ·        Load balancer
      
      ·        IDS/IPS          
      
      ·        AANRADIUS server
      
      ·        UTM appliance           
      
      ·        VoIP gateway
      
      ·        Content  filter         
      
      Lecture 12: Explain the purposes of virtualization and network storage technologies 
      ·        Virtual  networking components
      
      ·        Network  storage  types
      
      ·        Connection  type
      
      ·        Jumbo frame 
      
      Lecture 13: Compare and contrast WAN technologies 
      ·        Service type
      
      ·        Transmission  mediums
      
      ·        Characteristics   of service
      
      ·        Termination        
      
      Lecture 15: Compare and contrast business continuity and disaster recovery concepts 
      ·        Availability concepts
      
      ·        Recovery
      
      ·        MTBF
      
      ·        SLA  requirements    
      
      Lecture 14: Given a scenario, use appropriate documentation and diagrams to manage the network 
      ·        Diagram symbols
      
      ·        Standard operating procedures/
      
      ·        work instructions
      
      ·        Logical vs. physical diagrams
      
      ·        Rack diagrams
      
      ·        Change management documentation
      
      ·        Wiring and port locations
      
      ·        IDF/MDF documentation
      
      ·        Labelling
      
      ·        Network configuration and performance baselines
      
      ·        Inventory management        
      
      Lecture 16: Explain common scanning, monitoring and patching processes and summarize their expected outputs 
      ·        Processes
      
      ·        Event management
      
      ·        Metrics
      
      ·        SNMPmonitors  
      
      Lecture 17: Given a scenario, use remote access methods 
      ·        VPN
      
      ·        RDP
      
      ·        SSH
      
      ·        VNC
      
      ·        Telnet
      
      ·        HTTPS/management  URL
      
      ·        Remote tile access
      
      ·        Out-of-band  management    
      
      Lecture 18: Identify policies and best practices 
      ·        Privileged  user agreement
      
      ·        Password  policy
      
      ·        On-boarding/off-boarding procedures
      
      ·        Licensing  restrictions
      
      ·        International  export  controls
      
      ·        Data loss prevention
      
      ·        Remote access policies
      
      ·        Incident response  policies
      
      ·        BYOD
      
      ·        AUP
      
      ·        NDA
      
      ·        System life cycle
      
      ·        Safety procedures  and policies        
      
      Lecture 19: Summarize the purposes of physical security devices 
      ·        Detection
      
      ·        Prevention
      
      Lecture 20: Explain authentication and access controls 
      ·        Authorization, authentication and accounting
      
      ·        Multi factor authentication
      
      ·        Access control     
      
      Lecture 21: Given a scenario, secure a basic wireless network 
      ·        WPA
      
      ·        WPA2
      
      ·        TKIP-RC4
      
      ·        CCMP-AES
      
      ·        Authentication  and authorization
      
      ·        Geofencing     
      
      Lecture 22: Summarize common networking attacks 
      ·        Dos
      
      ·        Rogue access point
      
      ·        Spoofing
      
      ·        Evil twin
      
      ·        Deauthentication
      
      ·        War-driving
      
      ·        Brute force
      
      ·        Phishing
      
      ·        VLAN hopping
      
      ·        Social engineering
      
      ·        Ransomware
      
      ·        Man-in-the-middle
      
      ·        Insider  threat
      
      ·        DNS poisoning
      
      ·        Exploits  vs. vulnerabilities
      
      ·        Logic bomb
      
      ·        ARP poisoning    
      
      Lecture 23: Given a scenario, implement network device hardening 
      ·        Changing  default  credentials
      
      ·        Avoiding  common  passwords
      
      ·        Upgrading  firmware
      
      ·        Patching  and updates
      
      ·        File hashing
      
      ·        Disabling  unnecessary  services
      
      ·        Using secure protocols
      
      ·        Generating  new keys
      
      ·        Disabling  unused ports   
      
      Lecture 24: Explain common mitigation techniques and their purposes 
      ·        Signature  management
      
      ·        Device hardening
      
      ·        Change native  VLAN
      
      ·        Switch  port  protection
      
      ·        Network  segmentation
      
      ·        Privileged  user account
      
      ·        File integrity  monitoring
      
      ·        Role separation
      
      ·        Restricting  access via ACLs
      
      ·        Honeypot/honeynet
      
      ·        Penetration   testing
      
      Lecture 25: Explain the network troubleshooting methodology 
      ·        Identify the problem
      
      ·        Establish a theory of probable cause
      
      ·        Test the theory to determine the cause
      
      ·        Document findings, actions, and outcomes
      
      ·        Establish a plan of action to resolve the problem and identify
      
            potential effects
      
      ·        Implement the solution or escalate as necessary
      
      ·        Verify full system functionality and, if applicable, implement
      
            preventive measures     
      
      Lecture 26: Given a scenario, use the appropriate tool 
      ·        Hardware tools
      
      ·        Software tools        
      
      Lecture 27: Given a scenario, troubleshoot common wired connectivity and performance issues 
      ·        Attenuation
      
      ·        Latency
      
      ·        Jitter
      
      ·        Crosstalk
      
      ·        EMI
      
      ·        Open/short
      
      ·        Incorrect  pin-out
      
      ·        Incorrect  cable type
      
      ·        Bad port
      
      ·        Transceiver  mismatch
      
      ·        TX/RX reverse
      
      ·        Duplex/speed   mismatch
      
      ·        Damaged cables
      
      ·        Bent pins
      
      ·        Bottlenecks
      
      ·        VLAN mismatch
      
      ·        Network  connection   LED status  indicators 
      
      Lecture 28: Given a scenario, troubleshoot common wireless connectivity and performance issues 
      ·        Reflection
      
      ·        Refraction
      
      ·        Absorption
      
      ·        Latency          
      
      ·        Jitter
      
      ·        Attenuation
      
      ·        Incorrect antenna type
      
      ·        Interference
      
      ·        Incorrect antenna placement
      
      ·        Channel overlap
      
      ·        Overcapacity
      
      ·        Distance limitations
      
      ·        Frequency mismatch
      
      ·        Wrong SSID
      
      ·        Wrong passphrase
      
      ·        Security type mismatch
      
      ·        Power levels
      
      ·        Signal-to-noise ratio   
      
      Lecture 29: Given a scenario, troubleshoot common network service issues 
      ·        Names not resolving
      
      ·        Incorrect gateway
      
      ·        Incorrect netmask
      
      ·        Duplicate IP addresses
      
      ·        Duplicate MAC addresses
      
      ·        Expired  IP address
      
      ·        Rogue DHCP server
      
      ·        Untrusted SSL certificate
      
      ·        Incorrect  time
      
      ·        Exhausted  DHCP scope
      
      ·        Blocked TCP/UDP ports
      
      ·        Incorrect host-based firewall settings
      
      ·        Incorrect ACL settings
      
      ·        Unresponsive service
      
      ·        Hardware failure
    •   RH-124 Red Hat System Administration-I 
      ·         Lecture 30: Get started with Red Hat Enterprise Linux
      
      ·         Describe and define open source, Linux distributions, and
      
             Red Hat Enterprise Linux.
      
      ·         Lecture 31: Access the command line
      
      ·         Log into a Linux system and run simple commands using
      
             the shell.
      
      ·         Lecture 32: Manage files from the command line
      
      ·         Copy, move, create, delete, and organize files while working
      
             from the bash shell.
      
      ·         Lecture 33: Get help in Red Hat Enterprise Linux
      
      ·         Resolve problems by using local help systems
      
      ·         Lecture 34: Create, view, and edit text files
      
      ·         Manage text files from command output or in a text editor.
      
      ·         Lecture 35: Manage local users and groups
      
      ·         Create, manage, and delete local users and groups, as well
      
             as administer local password policies.
      
      ·         Lecture 36: Control access to files
      
      ·         Set Linux file system permissions on files and interpret the
      
             security effects of different permission settings.
      
      ·         Lecture 37: Monitor and manage Linux processes
      
      ·         Evaluate and control processes running on a Red Hat Enterprise
      
             Linux system.
      
      ·         Lecture 38: Control services and daemons
      
      ·         Control and monitor network services and system daemons using system.
      
      ·         Lecture 39: Configure and secure SSH
      
      ·         Configure secure command-line service on remote systems,
      
             using OpenSSH.
      
      ·         Lecture 40: Analyze and store logs
      
      ·         Locate and accurately interpret logs of system events for
      
             troubleshooting purposes.
      
      ·         Lecture 41: Manage networking
      
      ·         Configure network interfaces and settings on Red Hat Enterprise
      
             Linux servers.
      
      ·         Lecture 42: Archive and transfer files
      
      ·         Archive and copy files from one system to another.
      
      ·         Lecture 43: Install and update software
      
      ·         Download, install, update, and manage software packages
      
             from Red Hat and yum package repositories.
      
      ·         Lecture 44: Access Linux files systems
      
      ·         Access, inspect, and use existing file systems on storage
      
             attached to a Linux server.
      
      ·         Lecture 45: Analyze servers and get support
      
      ·         Investigate and resolve issues in the web-based management
      
             interface getting support from Red Hat to help solve problems.
      
      ·         Lecture 46: Comprehensive review
      
      ·         Review the content covered in this course by completing
      
             hands-on exercises
      
      RH -134 Red Hat System Administration-II 
      ·       Lecture 47: Improve command line productivity
      
      ·       Run commands more efficiently by using advanced features of the Bash shell, shell scripts, and various utilities provided by Red Hat Enterprise Linux.
      
      ·       Lecture 48: Schedule future tasks
      
      ·       Schedule commands to run in the future, either one time or on a repeating schedule.
      
      ·       Lecture 49: Tune system performance
      
      ·       Improve system performance by setting tuning parameters and adjusting scheduling priority of processes.
      
      ·       Lecture 50: Control access to files with ACLs
      
      ·       Interpret and set access control lists (ACLs) on files to handle situations requiring complex user and group access permissions.
      
      ·       Lecture 51: Manage SELinux security
      
      ·       Protect and manage the security of a server by using SELinux.
      
      ·       Lecture 52: Manage basic storage
      
      ·       Create and manage storage devices, partitions, file systems, and swap spaces from the command line.
      
      ·       Lecture 53: Manage logical volumes
      
      ·       Create and manage logical volumes containing file systems and swap spaces from the command line.
      
      ·       Lecture 54: Implement advanced storage features
      
      ·       Manage storage using the Stratis local storage management system and use VDO volumes to optimize storage space in use.
      
      ·       Lecture 55: Access network-attached storage
      
      ·       Use the NFS protocol to administer network-attached storage.
      
      ·       Lecture 56: Control the boot process
      
      ·       Manage the boot process to control services offered and to troubleshoot and repair problems
      
      ·       Lecture 57: Manage network security
      
      ·       Control network connections to services using the system firewall and SELinux rules.
      
      ·       Lecture 58: Install Red Hat Enterprise Linux
      
      ·       Install Red Hat Enterprise Linux on servers and virtual machines.
      
      ·       Lecture 59: Run Containers
      
      ·       Obtain, run, and manage simple, lightweight services as containers on a single Red Hat Enterprise Linux server.
      
      EX-200 Red Hat Certified System Administrator (RHCSA) 
      RHCSA exam candidates should be able to accomplish the tasks below without assistance. These have been grouped into several categories.
      
      ·         Understand and use essential tools
      
      ·         Access a shell prompt and issue commands with correct syntax
      
      ·         Use input-output redirection (>, >>, |, 2>, etc.)
      
      ·         Use grep and regular expressions to analyze text
      
      ·         Access remote systems using SSH
      
      ·         Log in and switch users in multiuser targets
      
      ·         Archive, compress, unpack, and uncompress files using tar,
      
             star, gzip, and bzip2
      
      ·         Create and edit text files
      
      ·         Create, delete, copy, and move files and directories
      
      ·         Create hard and soft links
      
      ·         List, set, and change standard ugo/rwx permissions
      
      ·         Locate, read, and use system documentation including man,
      
             info, and files in /usr/share/doc
      
      ·         Create simple shell scripts
      
      ·         Conditionally execute code (use of: if, test, [], etc.)
      
      ·         Use Looping constructs (for, etc.) to process file,
      
             command line input
      
      ·         Process script inputs ($1, $2, etc.)
      
      ·         Processing output of shell commands within a script
      
      ·         Processing shell command exit codes
      
      ·         Operate running systems
      
      ·         Boot, reboot, and shut down a system normally
      
      ·         Boot systems into different targets manually
      
      ·         Interrupt the boot process in order to gain access to a system
      
      ·         Identify CPU/memory intensive processes and kill processes
      
      ·         Adjust process scheduling
      
      ·         Manage tuning profiles
      
      ·         Locate and interpret system log files and journals
      
      ·         Preserve system journals
      
      ·         Start, stop, and check the status of network services
      
      ·         Securely transfer files between systems
      
      ·         Configure local storage
      
      ·         List, create, delete partitions on MBR and GPT disks
      
      ·         Create and remove physical volumes
      
      ·         Assign physical volumes to volume groups
      
      ·         Create and delete logical volumes
      
      ·         Configure systems to mount file systems at boot by
      
             universally unique ID (UUID) or label
      
      ·         Add new partitions and logical volumes, and swap to a
      
             system non-destructively
      
      ·         Create and configure file systems
      
      ·         Create, mount, unmount, and use vfat, ext4, and xfs file systems
      
      ·         Mount and unmount network file systems using NFS
      
      ·         Extend existing logical volumes
      
      ·         Create and configure set-GID directories for collaboration
      
      ·         Configure disk compression
      
      ·         Manage layered storage
      
      ·         Diagnose and correct file permission problems
      
      ·         Deploy, configure, and maintain systems
      
      ·         Schedule tasks using at and cron
      
      ·         Start and stop services and configure services to
      
             start automatically at boot
      
      ·         Configure systems to boot into a specific target automatically
      
      ·         Configure time service clients
      
      ·         Install and update software packages from Red Hat Network,
      
             a remote repository, or from the local file system
      
      ·         Work with package module streams
      
      ·         Modify the system bootloader
      
      ·         Manage basic networking
      
      ·         Configure IPv4 and IPv6 addresses
      
      ·         Configure hostname resolution
      
      ·         Configure network services to start automatically at boot
      
      ·         Restrict network access using firewall-cmd/firewall
      
      ·         Manage users and groups
      
      ·         Create, delete, and modify local user accounts
      
      ·         Change passwords and adjust password aging for local user
      
             accounts
      
      ·         Create, delete, and modify local groups and group memberships
      
      ·         Configure superuser access
      
      ·         Manage security
      
      ·         Configure firewall settings using firewall-cmd/firewalld
      
      ·         Create and use file access control lists
      
      ·         Configure key-based authentication for SSH
      
      ·         Set enforcing and permissive modes for SELinux
      
      ·         List and identify SELinux file and process context
      
      ·         Restore default file contexts
      
      ·         Use boolean settings to modify system SELinux settings
      
      ·         Diagnose and address routine SELinux policy violations
      
      ·         Manage containers
      
      ·         Find and retrieve container images from a remote registry
      
      ·         Inspect container images
      
      ·         Perform container management using commands such as
      
             podman and skopeo
      
      ·         Perform basic container management such as running, starting,
      
             stopping, and listing running containers
      
      ·         Run a service inside a container
      
      ·         Configure a container to start automatically as a systemd service
      
      ·         Attach persistent storage to a container
    •   RH - 254 Red Hat System Administration III 
      ·       Lecture-76: Control services and daemons
      
      ·       Review how to manage services and the boot-up process using systemctl.
      
      ·       Lecture-77: Manage IPv6 networking
      
      ·       Configure and troubleshoot basic IPv6 networking on Red Hat Enterprise Linux systems.
      
      ·       Lecture-78: Configure link aggregation and bridging
      
      ·       Configure and troubleshoot advanced network interface functionality including bonding, teaming, and local software bridges.
      
      ·       Lecture-79: Control network port security
      
      ·       Permit and reject access to network services using advanced SELinux and firewalld filtering techniques.
      
      ·       Lecture-80: Manage DNS for servers
      
      ·       Set and verify correct DNS records for systems and configure secure DNS caching.
      
      ·       Lecture-81: Configure email delivery
      
      ·       Relay all email sent by the system to an SMTP gateway for central delivery.
      
      ·       Lecture-82: Provide block-based storage
      
      ·       Provide and use networked iSCSI block devices as remote disks.
      
      ·       Lecture-83: Provide file-based storage
      
      ·       Provide NFS exports and SMB file shares to specific systems and users.
      
      ·       Lecture-84: Configure MariaDB databases
      
      ·       Provide a MariaDB SQL database for use by programs and database administrators.
      
      ·       Lecture-85: Provide Apache HTTPD web service
      
      ·       Configure Apache HTTPD to provide Transport Layer Security (TLS)-enabled websites and virtual hosts.
      
      ·       Lecture-86: Write bash scripts
      
      ·       Write simple shell scripts using bash.
      
      ·       Lecture-87: Bash conditionals and control structures
      
      ·       Use bash conditionals and other control structures to write more sophisticated shell commands and scripts.
      
      ·       Lecture-88: Configure the shell environment
      
      ·       Customize bash startup and use environment variables, bash aliases, and bash functions.
      
      ·       Lecture 89: Comprehensive review
      
      ·       Practice and demonstrate knowledge and skills learned in this course.
      
      EX - 300 RHCE-Red Hat Certified Engineer 
      RHCE exam candidates should consult the RHCSA exam objectives and be capable of RHCSA-level tasks, as some of these skills may be required in order to meet RHCE exam objectives. Red Hat reserves the right to add, modify, and remove objectives. Such changes will be made public in advance through revisions to this document.
      
      ·         System configuration and management
      
      ·         Use network teaming or bonding to configure aggregated network
      
             links between two Red Hat Enterprise Linux systems
      
      ·         Configure IPv6 addresses and perform basic IPv6 troubleshooting
      
      ·         Route IP traffic and create static routes
      
      ·         Use firewalld and associated mechanisms such as rich rules, zones
      
             and custom rules, to implement packet filtering and configure network
      
             address translation (NAT)
      
      ·         Configure a system to authenticate using Kerberos
      
      ·         Configure a system as either an iSCSI target or initiator that
      
             persistently mounts an iSCSI target
      
      ·         Produce and deliver reports on system utilization (processor,
      
             memory, disk, and network)
      
      ·         Use shell scripting to automate system maintenance tasks
      
      ·         Network services 
      
      ·         Install the packages needed to provide the service
      
      ·         Configure SELinux to support the service
      
      ·         Use SELinux port labeling to allow services to use non-standard ports
      
      ·         Configure the service to start when the system is booted
      
      ·         Configure the service for basic operation
      
      ·         Configure host-based and user-based security for the service
      
      ·         HTTP/HTTPS
      
      ·         Configure a virtual host
      
      ·         Configure access restrictions on directories
      
      ·         Deploy a basic CGI application
      
      ·         Configure group-managed content
      
      ·         Configure TLS security
      
      ·         DNS
      
      ·         Configure a caching-only name server
      
      ·         Troubleshoot DNS client issues
      
      ·         NFS
      
      ·         Provide network shares to specific clients
      
      ·         Provide network shares suitable for group collaboration
      
      ·         Use Kerberos to control access to NFS network shares
      
      ·         SMB
      
      ·         Provide network shares to specific clients
      
      ·         Provide network shares suitable for group collaboration
      
      ·         SMTP
      
      ·         Configure a system to forward all email to a central mail server
      
      ·         SSH
      
      ·         Configure key-based authentication
      
      ·         Configure additional options described in documentation
      
      ·         NTP
      
      ·         Synchronize time using other NTP peers
      
      ·         Database services
      
      ·         Install and configure MariaDB
      
      ·         Backup and restore a database
      
      ·         Create a simple database schema
      
      ·         Perform simple SQL queries against a database
      
      RH - 294 Red Hat System Administration III: Linux Automation 
      ·      Lecture – 1 Introduce Ansible
      
      ·      Describe Ansible concepts and install Red Hat Ansible Engine.
      
      ·      Lecture – 2 Deploy Ansible
      
      ·      Configure Ansible to manage hosts and run ad hoc
      
           Ansible commands.
      
      ·      Lecture – 3 Implement playbooks
      
      ·      Write a simple Ansible Playbook and run it to automate tasks
      
           on multiple managed hosts.
      
      ·      Lecture – 4 Manage variables and facts
      
      ·      Write playbooks that use variables to simplify management of
      
            the playbook and facts to reference information about managed
      
            hosts.
      
      ·      Lecture – 5 Implement task control
      
      ·      Manage task control, handlers, and task errors in Ansible
      
           Playbooks.
      
      ·      Lecture – 6 Deploy files to managed hosts
      
      ·      Deploy, manage, and adjust files on hosts managed by Ansible.
      
      ·      Lecture – 7 Manage large projects
      
      ·      Write playbooks that are optimized for larger, more complex
      
            projects.
      
      ·      Lecture – 8 Simplify playbooks with roles
      
      ·      Use Ansible roles to develop playbooks more quickly and to reuse
      
           Ansible code.
      
      ·      Lecture – 9 Troubleshoot Ansible
      
      ·      Troubleshoot playbooks and managed hosts.
      
      ·      Lecture – 10 Automate Linux administration tasks
      
      ·      Automate common Linux system administration tasks
      
           with Ansible
      
      EX - 294 RHCE - Red Hat Certified Engineer 
      As an RHCE exam candidate, you should be able to handle all responsibilities expected of a Red Hat Certified System Administrator, including these tasks: Be able to perform all tasks expected of a Red Hat Certified System Administrator
      
       
      
      ·         Understand and use essential tools
      
      ·         Operate running systems
      
      ·         Configure local storage
      
      ·         Create and configure file systems
      
      ·         Deploy, configure, and maintain systems
      
      ·         Manage users and groups
      
      ·         Manage security
      
      ·         Understand core components of Ansible
      
      ·         Inventories
      
      ·         Modules
      
      ·         Variables
      
      ·         Facts
      
      ·         Plays
      
      ·         Playbooks
      
      ·         Configuration files
      
      ·         Use provided documentation to look up specific information about Ansible modules and commands
      
      ·         Install and configure an Ansible control node
      
      ·         Install required packages
      
      ·         Create a static host inventory file
      
      ·         Create a configuration file
      
      ·         Create and use static inventories to define groups of hosts
      
      ·         Manage parallelism
      
      ·         Configure Ansible managed nodes
      
      ·         Create and distribute SSH keys to managed nodes
      
      ·         Configure privilege escalation on managed nodes
      
      ·         Validate a working configuration using ad hoc Ansible commands
      
      ·         Script administration tasks
      
      ·         Create simple shell scripts
      
      ·         Create simple shell scripts that run ad hoc Ansible commands
      
      ·         Create Ansible plays and playbooks
      
      ·         Know how to work with commonly used Ansible modules
      
      ·         Use variables to retrieve the results of running a command
      
      ·         Use conditionals to control play execution
      
      ·         Configure error handling
      
      ·         Create playbooks to configure systems to a specified state
      
      ·         Use Ansible modules for system administration tasks that work with:
      
      ·         Software packages and repositories
      
      ·         Services
      
      ·         Firewall rules
      
      ·         File systems
      
      ·         Storage devices
      
      ·         File content
      
      ·         Archiving
      
      ·         Scheduled tasks
      
      ·         Security
      
      ·         Users and groups
      
      ·         Work with roles
      
      ·         Create roles
      
      ·         Download roles from an Ansible Galaxy and use them
    Basic Computer Knowledge.
    The course offers a variety of online training options, including: • Live Virtual Classroom Training: Participate in real-time interactive sessions with instructors and peers. • 1:1 Doubt Resolution Sessions: Get personalized assistance and clarification on course-related queries. • Recorded Live Lectures*: Access recorded sessions for review or to catch up on missed classes. • Flexible Schedule: Enjoy the flexibility to learn at your own pace and according to your schedule.
    Live Virtual Classroom Training allows you to attend instructor-led sessions in real-time through an online platform. You can interact with the instructor, ask questions, participate in discussions, and collaborate with fellow learners, simulating the experience of a traditional classroom setting from the comfort of your own space.
    If you miss a live session, you can access recorded lectures* to review the content covered during the session. This allows you to catch up on any missed material at your own pace and ensures that you don't fall behind in your learning journey.
    The course offers a flexible schedule, allowing you to learn at times that suit you best. Whether you have other commitments or prefer to study during specific hours, the course structure accommodates your needs, enabling you to balance your learning with other responsibilities effectively. *Note: Availability of recorded live lectures may vary depending on the course and training provider.
    Education Provider
    Baroda Institute Of Technology - Training Program

    BIT (Baroda Institute Of Technology) Is A Training And Development Organization Catering To The Learning Requirements Of Candidates Globally Through A Wide Array Of Services. Established In 2002. BIT Strength In The Area Is Signified By The Number Of Its Authorized Training Partnerships. The Organization Conducts Trainings For Microsoft, Cisco , Red Hat , Oracle , EC-Council , Etc. Domains / Specialties Corporate Institutional Boot Camp / Classroom Online – BIT Virtual Academy Skill Development Government BIT’s Vision To Directly Associate Learning With Career Establishment Has Given The Right Set Of Skilled Professionals To The Dynamic Industry. Increased Focus On Readying Candidates For On-the-job Environments Makes It A Highly Preferred Learning Provider. BIT Is Valued For Offering Training That Is At Par With The Latest Market Trends And Also Match The Potential Of Candidates. With More Than A Decade Of Experience In Education And Development, The Organization Continues To Explore Wider Avenues In Order To Provide Learners A Platform Where They Find A Solution For All Their Up- Skilling Needs!

    Graduation
    2002
    Data Sciences

    More Courses by : Baroda Institute of Technology


    Baroda Institute of Technology
    ₹60000  65000

    8% off

    This includes following
    •  270 Hours
    •  Completion certificate : Yes
    •  Language : Hinglish

    More Courses by : Baroda Institute of Technology