Red Hat Linux System Administration (RHCSA) in 21 Days

Red Hat Linux System Administration (RHCSA) in 21 Days

Red Hat Systems Administrators, who work on Linux operating systems, configure, implement, and deploy systems and take care of security issues, besides managing system backups and adding and removing users. They will be part of a team that handles daily tickets and devises and implements technology solutions.

They need to be good team players with excellent communication skills. Red Hat Systems Administrators also need to have an analytical bent of mind and competent problem-solving skills.

Course Objectives

Understand and use essential tools
  • Access a shell prompt and issue commands with correct syntax
  • Use input-output redirection (>, >>, |, 2>, etc.)
  • Use grep and regular expressions to analyze text
  • Access remote systems using SSH
  • Log in and switch users in multiuser targets
  • Archive, compress, unpack, and uncompress files using tar, star, gzip, and bzip2
  • Create and edit text files
  • Create, delete, copy, and move files and directories
  • Create hard and soft links
  • List, set, and change standard ugo/rwx permissions
  • Locate, read, and use system documentation including man, info, and files in /usr/share/doc
Create simple shell scripts
  • Conditionally execute code (use of: if, test, [], etc.)
  • Use Looping constructs (for, etc.) to process file, command line input
  • Process script inputs ($1, $2, etc.)
  • Processing output of shell commands within a script
  • Processing shell command exit codes
Operate running systems
  • Boot, reboot, and shut down a system normally
  • Boot systems into different targets manually
  • Interrupt the boot process in order to gain access to a system
  • Identify CPU/memory intensive processes and kill processes
  • Adjust process scheduling
  • Manage tuning profiles
  • Locate and interpret system log files and journals
  • Preserve system journals
  • Start, stop, and check the status of network services
  • Securely transfer files between systems
Configure local storage
  • List, create, delete partitions on MBR and GPT disks
  • Create and remove physical volumes
  • Assign physical volumes to volume groups
  • Create and delete logical volumes
  • Configure systems to mount file systems at boot by universally unique ID (UUID) or label
  • Add new partitions and logical volumes, and swap to a system non-destructively
Create and configure file systems
  • Create, mount, unmount, and use vfat, ext4, and xfs file systems
  • Mount and unmount network file systems using NFS
  • Extend existing logical volumes
  • Create and configure set-GID directories for collaboration
  • Configure disk compression
  • Manage layered storage
  • Diagnose and correct file permission problems
Deploy, configure, and maintain systems
  • Schedule tasks using at and cron
  • Start and stop services and configure services to start automatically at boot
  • Configure systems to boot into a specific target automatically
  • Configure time service clients
  • Install and update software packages from Red Hat Network, a remote repository, or from the local file system
  • Work with package module streams
  • Modify the system bootloader
Manage basic networking
  • Configure IPv4 and IPv6 addresses
  • Configure hostname resolution
  • Configure network services to start automatically at boot
  • Restrict network access using firewall-cmd/firewall
Manage users and groups
  • Create, delete, and modify local user accounts
  • Change passwords and adjust password aging for local user accounts
  • Create, delete, and modify local groups and group memberships
  • Configure superuser access
Manage security
  • Configure firewall settings using firewall-cmd/firewalld
  • Create and use file access control lists
  • Configure key-based authentication for SSH
  • Set enforcing and permissive modes for SELinux
  • List and identify SELinux file and process context
  • Restore default file contexts
  • Use boolean settings to modify system SELinux settings
  • Diagnose and address routine SELinux policy violations
Manage containers
  • Find and retrieve container images from a remote registry
  • Inspect container images
  • Perform container management using commands such as podman and skopeo
  • Perform basic container management such as running, starting, stopping, and listing running containers
  • Run a service inside a container
  • Configure a container to start automatically as a systemd service
  • Attach persistent storage to a container

Target Audience

  • System Engineer
  • IT Professionals

Course Pre-Requisites : ​

  • Combination of Red Hat System Administration I and Red Hat System Administration II courses or equivalent experience
  • Equivalent experience to the RHCSA Rapid Track Course (RH200)

Course Duration ​

Introduction to UNIX & LINUX

1
Introduction to Operating Systems
2
Parts of Operating System
3
Kernel, Shell & File
4
History of UNIX and LINUX
5
Linux and GNU Project
6
Basic Concepts of Linux
7
Identification of various Linux distributors
8
Discussion About RHCSA Exam

RHEL 8 Installations & Lab Setup

1
Planning a Linux Installation
2
Partitioning Requirements
3
Linux Installation Method
4
Required Partitions for RHEL 8 Installation
5
Dual Booting with Windows Operating System
6
Download and Install VMware Workstation

RHEL 8 Installations & Basic Configure

1
Introduction to VMware Workstation
2
Introduction Virtualization Technology
3
Create VM on VMware Workstation for RHEL 8
4
Installation of RHEL on VMware Workstation
5
Install RHEL instance of AWS cloud
6
Configure BIOS/UEFI options for OS booting
7
Details discussion about OS booting options
8
Details discussion about Installation Summary
9
Linux Installation Method (MBR and GPT)
10
Configure Post installation on RHEL 8

Getting started with Linux

1
The GNOME Desktop Environment
2
Working with terminal and command console
3
Introduction to Linux shells and terminal
4
Linux Virtual Console/Terminal
5
Logging remote system through SSH
6
Logging web interface using cockpit
7
Linux Command Syntax, Options, Argument
8
Examples of Simple Commands
9
Powering Off, Reboot and Logout System
10
Navigating Linux Directory Paths
11
Command-line File & Directory Management
12
Files & Directory handling commands

Linux Text Processing Tools

1
Standard Input, Output and Error Concept
2
Redirecting Output to a File
3
Constructing and Using Pipelines
4
Working with Regular Expressions ‘grep’
5
Familiar with Linux ‘find’, ‘ and ‘locate’
6
Documentation for Commands

Linux Text Editors

1
Why need text editor
2
Different types of text editors
3
Introduction to ‘vi/vim’ and ‘gedit’
4
Linux Text Editor Utilities (vim, gedit, nano)
5
Working with Different ‘vi/vim’ Modes
6
Editing, Replacing, Searching with ‘vi/vim’
7
Working with ‘vim’ advanced features

User and Group Administration

1
Users and Groups Introduction
2
Linux User Types and Database
3
Primary Groups and Supplementary Groups
4
Gaining Super user Access
5
Running commands as root with SUDO
6
Managing Local User Accounts
7
Managing Local Group Accounts
8
Managing User Passwords
9
Managing User’s Password Aging

Linux File Permissions and ACL

1
Explore Linux File & Directory Types
2
Linux standard file permissions
3
Hard Link and Soft Link concepts
4
Viewing File/Directory Permission and Ownership
5
Linux User, Group and Other permission Concept
6
Set permission using read, write and execute
7
Linux Special Permissions SUID, SGID, Sticky bit
8
Securing Files with ACLs
9
Creating, modifying and deleting ACL’s

Creating

modifying and deleting ACL’s

1
Why Need Backup?
2
Different types of Backup method
3
Archive Files and Directories using ‘tar’
4
Discuss about different ‘tar’ options
5
Extract Compressed ‘tar’ Archive
6
Discuss about gz, bz2 and xz Compression
7
Compress and De-compress using ‘gz, bz2, xz’

Linux Boot

Process and Services

1
Step by step Linux booting procedures
2
Explain and Controlling the Boot Process
3
Working with GRUB2 Boot loader
4
Working with Linux Kernel (CentOS)
5
Update Linux Kernel (CentOS)
6
Introducing RHEL Systemd
7
Controlling RHEL daemon & Services
8
Enabling/Disabling System Daemons at boot
9
Linux process management introduction
10
Parent processes and child processes
11
System process and user processes
12
Details explain of “TOP” command
13
Graphical process monitoring system
14
Background and Foreground Processes
15
Controlling jobs using ‘bg’, ‘fg’, ‘ctrl+z’, ‘ctrl+c’
16
Monitoring & Killing Process Activities
17
Process priority and ‘nice’ concepts
18
Managing priority of Linux Process

RHEL File System and SWAP Management

1
Identifying File Systems and Devices
2
Understanding Linux file systems
3
Managing MBR Partitions with ‘fdisk’
4
Managing GPT Partitions with ‘gdisk’
5
Creating File System (xfs, ext4, swap)
6
Mount Points and ‘/etc/fstab’ – Details
7
Mounting and Un-mounting File Systems
8
Working with USB, DVD, ISO, VFAT
9
Why need swap partition
10
Create additional ‘swap’ space

Linux LVM Management (LVM)

1
Limitation of Standard Partitions
2
Importance of Logical Volume Management (LVM)
3
Preparing storage partitions for LVM
4
Creating Physical volumes (PV)
5
Creating Volume Group (VG)
6
Creating Logical Volume (LV)
7
Extend Volume Group (VG)
8
Extend Logical Volumes
9
Resizing Logical Volumes
10
Remove Logical Volumes

RHEL Network Management (IPv4 & IPv6)

1
Understand Network Device Recognition
2
Working with NetworkManager Services
3
Introducing Network Manager tools (nmcli & nmtui)
4
Configuring Host Name and Name Resolution
5
Working with gateway and route table
6
Static and dynamic Configure Static and dynamic IP
7
Configuring IPv4 Networking using ‘nmtui’
8
Configuring IPv6 Networking ‘nmcli’
9
Advanced configure using ‘vim’ text editor

Linux Package Management System

1
Software Packages and RPM
2
The Linux Package Management system
3
Examining RPM Package Files
4
RPM Install, Queries and verifying
5
Dependency problems and Resolution
6
Concept of YUM Repositories and Clients
7
Register system with Red Hat Portal
8
Packages Install and Remove with YUM & DNF
9
Enable Third-party Software Repositories (EPEL)

RHEL Virtualization and Container

1
Virtualization Introduction
2
RHEL Virtualization Introduction
3
Working with Linux Qemu-KVM
4
Required resources for RHEL Virtualization
5
Create VM and install new OS
6
Virtualization vs Containerization
7
Red Hat Containerization using Podman
8
Inspect container images
9
Perform basic container management
10
Run a service inside a container

CRON Process & Scheduling

1
Introduction to Linux Scheduling
2
Scheduling Recurring Jobs with ‘cron’
3
Scheduling System cron Jobs
4
Explain cron job file format
5
Running commands at particular times
6
Identify various CRON entries and schedules
7
Scheduling Future Linux Tasks

Configuring OpenSSH Service

1
What is the Secure Shell (SSH)?
2
How SSH (Secure Shell) works?
3
SSH Host Keyes (Public and Private)
4
Configuring SSH Key-based Authentication
5
Password less SSH Login
6
Customizing SSH Service Configuration
7
Restricting SSH Logins (root)
8
Putty and Open SSH Clients
9
Secure Copy Through ‘scp’

Linux Advanced Storage and NFS

1
NFS Server Configuration and NFS Clients
2
Setup an NFS server and export directories
3
Review /etc/exports parameters and options
4
Evaluate access to NFS exports
5
Mount NFS server in NFS clients
6
NFS Server Auto mount

Linux Scripting with Bash

1
Introduction to Shell Scripting
2
Creating and Executing First Shell Script
3
Working with Shell Variables
4
Passing Arguments to the Bash Script
5
Executing Shell Commands with Bash
6
Reading User Input in Bash Shell
7
Working with Bash Statement
8
Bash Conditional and Control Structures
9
Working with Login and Non-Login shells
10
System information through bash scripts

Linux Firewall and SELinux Security

1
Introduction to Firewall Technologies
2
Netfilter and Firewalld concepts
3
Working with ‘firewalld’ zones concepts
4
Managing & Configure Firewall Settings
5
IP, ICMP, Port, Service Filtering using ‘firewalld’
6
Introducing SELinux Security
7
Explanation of SELinux Modes
8
Working with SELinux Security Context
9
Managing SELinux port Labeling
10
Working with SELinux Boolean

Linux System Tuning & Troubleshooting

1
Tuning Operating System
2
Working with Syslog Files
3
Monitor Log Files with ‘tail’
4
Preserving the ‘systemd’ Journal
5
Port monitoring with netstat
6
MTR, Traceroute, TCP dumps, nmap concept
7
Recovering Root Password
8
Recovering GRUB BootLoader
9
Common System Hardening

Be the first to add a review.

Please, login to leave a review
Add to Wishlist
Lectures: 191
Video: 60 Hours

Archive

Working hours

Monday 9:30 am - 6.00 pm
Tuesday 9:30 am - 6.00 pm
Wednesday 9:30 am - 6.00 pm
Thursday 9:30 am - 6.00 pm
Friday 9:30 am - 5.00 pm
Saturday Closed
Sunday Closed

Login Or Register