$3,135.00
Duration: 5 Days
This course is for individuals who have completed Red Hat® System Administration I (RH124). It focuses on the key tasks needed to become a full-time administrator of Red Hat Enterprise Linux 7. You will examine enterprise Linux administration including file systems and partitioning, logical volumes, SELinux, firewalling, and troubleshooting. Attending both Red Hat® System Administration I (RH124) and Red Hat® System Administration II (RH134) can help you in your preparation for the Red Hat Certified System Administrator Exam (EX200). The RHCSA exam is included in this course.
Note: Proven Impact and Red Hat do not guarantee that anyone who takes one or all of the courses in the Red Hat certification program will pass a Red Hat exam. On-the-job experience, in combination with high-quality training, is the best way to build skills and prepare for a Red Hat exam. The exam itself is a hands-on learning experience, and many of those who do not pass on the first try come away with knowledge of what they need to work on to pass the exam on a re-take.
Individuals who have completed Red Hat® System Administration I (RH124)
Individuals that have not taken a previous Red Hat course are encouraged to take either Red Hat® System Administration I (RH124) if they are new to Linux, or the RHCSA® Rapid Track Course with Exam (RH200) if they are experienced with enterprise Linux administration
1. Automate installation with Kickstart
2. Automate the installation of Red Hat Enterprise Linux systems with Kickstart
3. Use regular expressions with grep
4. Write regular expressions that, when partnered with grep, will allow you to quickly isolate or locate content within text files
5. Create and Edit text files with vim
6. Introduce the vim text editor, with which you can open, edit, and save text files
7. Schedule future Linux tasks
8. Schedule tasks to automatically execute in the future
9. Manage priority of Linux processes
10. Influence the relative priorities at which Linux processes run
11. Control access to files with access control lists (ACL)
12. Manage file security using POSIX access control lists
13. Manage SELinux security
14. Manage the Security Enhanced Linux (SELinux) behavior of a system to keep it secure in case of a network service compromise
15. Connect to network-defined users and groups
16. Configure systems to use central identity management services
17. Add disks, partitions, and file systems to a Linux system
18. Manage simple partitions and file systems
19. Manage logical volume management (LVM) storage
20. Manage logical volumes from the command line
21. Access networked attached storage with network file system (NFS)
22. Access (secure) NFS shares
23. Access networked storage with SMB
24. Use autofs and the command line to mount and unmount SMB file systems
25. Control and troubleshoot the Red Hat Enterprise Linux boot process
26. Limit network communication with firewall
27. Configure a basic firewall
28. Comprehensive review
29. Practice and demonstrate knowledge and skills learned in this course
Copyright © 2015 Proven Impact