Rhcsa training

Fundamental Red Hat system administration skills and building command-line administration skills.

Course Description

Red Hat System Administration I (RH124)relates to RHEL 7 and is designed for IT professionals who are new to Linux and require core Red Hat Enterprise Linux skills. This course focuses on essential administration tasks that will be encountered in the workplace, including installing the operating system, establishing network connectivity, managing physical storage, and performing basic security administration.

Early in the course, GUI-based tools will be featured to build upon the students' existing technical knowledge. As the course progresses, key command-line concepts will be introduced to provide a foundation for students planning to continue to Red Hat System Administration II with the goal of becoming full-time Linux system administrators.

Red Hat System Administration II (RH134)relates to RHEL 7 and is designed for IT professionals working to become full-time enterprise Linux system administrators. Building on the foundation of command-line skills covered in System Administration I, students will dive deeper into Red Hat Enterprise Linux to broaden their toolkits of administration skills. By the end of this course, students will be able to administer and troubleshoot file systems and partitioning, logical volume management, access control, and package management. Students who attend Red Hat System Administration I and II will be fully prepared to take the Red Hat Certified System Administration (RHCSA) exam.

DURATION : 4 weeks

Course Outline

Red Hat System Administrator

System Administrator-I
  • Introduction to the command line
  • Managing physical storage
  • Learning how to install and configure local components and services
  • Establishing network and securing network services
  • Managing and securing files
  • Administrating users and groups
  • Accessing Linux file systems
  • Reviewing the system log files and journal
  • Monitoring and managing processes
Full Course Outline
  • Log in to a Linux system and run simple commands using the shell.
  • Copy, move, create, delete, and organize files from the bash shell prompt.
  • Resolve problems by using online help systems and Red Hat support utilities.
  • Create, view, and edit text files from command output or in an editor.
  • Manage local Linux users and groups, and administer local password policies.
  • Set Linux file system permissions on files and interpret the security effects of different permission settings.
  • Obtain information about the system, and control processes running on it.
  • Control and monitor network services and system daemons using systemd.
  • Access and provide access to the command line on remote systems securely using OpenSSH.
  • Locate and accurately interpret relevant system log files for troubleshooting purposes.
  • Configure basic IPv4 networking on Red Hat Enterprise Linux systems.
  • Archive files and copy them from one system to another.
  • Download, install, update, and manage software packages from Red Hat and yum package repositories.
  • Access and inspect existing file systems on a Red Hat Enterprise Linux system.
  • Create and use Red Hat Enterprise Linux virtual machines with KVM and libvirt.
System Administrator-II
  • Installation using Kickstart
  • Managing file systems and logical volumes
  • Managing scheduled jobs
  • Accessing network filesystems
  • Managing SELinux
  • Controlling firewalling
  • Troubleshooting
Full Course Outline
  • Automate the installation of Red Hat Enterprise Linux systems with Kickstart.
  • Introduce the vim text editor, with which you can open, edit, and save text files.
  • Schedule tasks to automatically execute in the future.
  • Influence the relative priorities at which Linux processes run.
  • Write regular expressions that, when partnered with grep, will allow you to quickly isolate or locate content within text files.
  • Manage file security using POSIX access control lists.
  • Manage the Security Enhanced Linux (SELinux) behavior of a system to keep it secure in case of a network service compromise.
  • Configure systems to use central identity management services.
  • Manage simple partitions and file systems.
  • Manage logical volumes from the command line.
  • Access (secure) NFS shares.
  • Use autofs and the command line to mount and unmount SMB file systems.
  • Configure a basic firewall.
entersoftlabs-logo
                 

95.5% of our students passed in first attempt of RHCE and with second(free) attempt 99% of students passed so far.

Entersoftlabs trained 500+ students as Certified Ethical Hackers, highest ever by any organization in the country. Entersoft labs trained over 400+ RHCEs in an year fastest ever by any organization in asia in its first year of operations. Quality is our motto and its helping our students to pass certifications with out any issues.


© 2013 Entersoftlabs Inc. All rights reserved.