RH-124 Red Hat System Administration-I
· Lecture 30: Get started with Red Hat Enterprise Linux
· Describe and define open source, Linux distributions, and
Red Hat Enterprise Linux.
· Lecture 31: Access the command line
· Log into a Linux system and run simple commands using
the shell.
· Lecture 32: Manage files from the command line
· Copy, move, create, delete, and organize files while working
from the bash shell.
· Lecture 33: Get help in Red Hat Enterprise Linux
· Resolve problems by using local help systems
· Lecture 34: Create, view, and edit text files
· Manage text files from command output or in a text editor.
· Lecture 35: Manage local users and groups
· Create, manage, and delete local users and groups, as well
as administer local password policies.
· Lecture 36: Control access to files
· Set Linux file system permissions on files and interpret the
security effects of different permission settings.
· Lecture 37: Monitor and manage Linux processes
· Evaluate and control processes running on a Red Hat Enterprise
Linux system.
· Lecture 38: Control services and daemons
· Control and monitor network services and system daemons using system.
· Lecture 39: Configure and secure SSH
· Configure secure command-line service on remote systems,
using OpenSSH.
· Lecture 40: Analyze and store logs
· Locate and accurately interpret logs of system events for
troubleshooting purposes.
· Lecture 41: Manage networking
· Configure network interfaces and settings on Red Hat Enterprise
Linux servers.
· Lecture 42: Archive and transfer files
· Archive and copy files from one system to another.
· Lecture 43: Install and update software
· Download, install, update, and manage software packages
from Red Hat and yum package repositories.
· Lecture 44: Access Linux files systems
· Access, inspect, and use existing file systems on storage
attached to a Linux server.
· Lecture 45: Analyze servers and get support
· Investigate and resolve issues in the web-based management
interface getting support from Red Hat to help solve problems.
· Lecture 46: Comprehensive review
· Review the content covered in this course by completing
hands-on exercises
RH -134 Red Hat System Administration-II
· Lecture 47: Improve command line productivity
· Run commands more efficiently by using advanced features of the Bash shell, shell scripts, and various utilities provided by Red Hat Enterprise Linux.
· Lecture 48: Schedule future tasks
· Schedule commands to run in the future, either one time or on a repeating schedule.
· Lecture 49: Tune system performance
· Improve system performance by setting tuning parameters and adjusting scheduling priority of processes.
· Lecture 50: Control access to files with ACLs
· Interpret and set access control lists (ACLs) on files to handle situations requiring complex user and group access permissions.
· Lecture 51: Manage SELinux security
· Protect and manage the security of a server by using SELinux.
· Lecture 52: Manage basic storage
· Create and manage storage devices, partitions, file systems, and swap spaces from the command line.
· Lecture 53: Manage logical volumes
· Create and manage logical volumes containing file systems and swap spaces from the command line.
· Lecture 54: Implement advanced storage features
· Manage storage using the Stratis local storage management system and use VDO volumes to optimize storage space in use.
· Lecture 55: Access network-attached storage
· Use the NFS protocol to administer network-attached storage.
· Lecture 56: Control the boot process
· Manage the boot process to control services offered and to troubleshoot and repair problems
· Lecture 57: Manage network security
· Control network connections to services using the system firewall and SELinux rules.
· Lecture 58: Install Red Hat Enterprise Linux
· Install Red Hat Enterprise Linux on servers and virtual machines.
· Lecture 59: Run Containers
· Obtain, run, and manage simple, lightweight services as containers on a single Red Hat Enterprise Linux server.
EX-200 Red Hat Certified System Administrator (RHCSA)
RHCSA exam candidates should be able to accomplish the tasks below without assistance. These have been grouped into several categories.
· Understand and use essential tools
· Access a shell prompt and issue commands with correct syntax
· Use input-output redirection (>, >>, |, 2>, etc.)
· Use grep and regular expressions to analyze text
· Access remote systems using SSH
· Log in and switch users in multiuser targets
· Archive, compress, unpack, and uncompress files using tar,
star, gzip, and bzip2
· Create and edit text files
· Create, delete, copy, and move files and directories
· Create hard and soft links
· List, set, and change standard ugo/rwx permissions
· Locate, read, and use system documentation including man,
info, and files in /usr/share/doc
· Create simple shell scripts
· Conditionally execute code (use of: if, test, [], etc.)
· Use Looping constructs (for, etc.) to process file,
command line input
· Process script inputs ($1, $2, etc.)
· Processing output of shell commands within a script
· Processing shell command exit codes
· Operate running systems
· Boot, reboot, and shut down a system normally
· Boot systems into different targets manually
· Interrupt the boot process in order to gain access to a system
· Identify CPU/memory intensive processes and kill processes
· Adjust process scheduling
· Manage tuning profiles
· Locate and interpret system log files and journals
· Preserve system journals
· Start, stop, and check the status of network services
· Securely transfer files between systems
· Configure local storage
· List, create, delete partitions on MBR and GPT disks
· Create and remove physical volumes
· Assign physical volumes to volume groups
· Create and delete logical volumes
· Configure systems to mount file systems at boot by
universally unique ID (UUID) or label
· Add new partitions and logical volumes, and swap to a
system non-destructively
· Create and configure file systems
· Create, mount, unmount, and use vfat, ext4, and xfs file systems
· Mount and unmount network file systems using NFS
· Extend existing logical volumes
· Create and configure set-GID directories for collaboration
· Configure disk compression
· Manage layered storage
· Diagnose and correct file permission problems
· Deploy, configure, and maintain systems
· Schedule tasks using at and cron
· Start and stop services and configure services to
start automatically at boot
· Configure systems to boot into a specific target automatically
· Configure time service clients
· Install and update software packages from Red Hat Network,
a remote repository, or from the local file system
· Work with package module streams
· Modify the system bootloader
· Manage basic networking
· Configure IPv4 and IPv6 addresses
· Configure hostname resolution
· Configure network services to start automatically at boot
· Restrict network access using firewall-cmd/firewall
· Manage users and groups
· Create, delete, and modify local user accounts
· Change passwords and adjust password aging for local user
accounts
· Create, delete, and modify local groups and group memberships
· Configure superuser access
· Manage security
· Configure firewall settings using firewall-cmd/firewalld
· Create and use file access control lists
· Configure key-based authentication for SSH
· Set enforcing and permissive modes for SELinux
· List and identify SELinux file and process context
· Restore default file contexts
· Use boolean settings to modify system SELinux settings
· Diagnose and address routine SELinux policy violations
· Manage containers
· Find and retrieve container images from a remote registry
· Inspect container images
· Perform container management using commands such as
podman and skopeo
· Perform basic container management such as running, starting,
stopping, and listing running containers
· Run a service inside a container
· Configure a container to start automatically as a systemd service
· Attach persistent storage to a container