Red Hat Linux System Administration (RHCSA) in 21 Days
Back to Dashboard
Hey there, great course, right? Do you like this course?
All of the most interesting lessons further. In order to continue you just need to purchase it
Get course
à§³12,000
One Time Payment
Enroll with Membership
Course sections
Section 1
Introduction to UNIX & LINUX
1
Introduction to Operating Systems
2
Parts of Operating System
3
Kernel, Shell & File
4
History of UNIX and LINUX
5
Linux and GNU Project
6
Basic Concepts of Linux
7
Identification of various Linux distributors
8
Discussion About RHCSA Exam
Section 2
RHEL 8 Installations & Lab Setup
1
Planning a Linux Installation
2
Partitioning Requirements
3
Linux Installation Method
4
Required Partitions for RHEL 8 Installation
5
Dual Booting with Windows Operating System
6
Download and Install VMware Workstation
Section 3
RHEL 8 Installations & Basic Configure
1
Introduction to VMware Workstation
2
Introduction Virtualization Technology
3
Create VM on VMware Workstation for RHEL 8
4
Installation of RHEL on VMware Workstation
5
Install RHEL instance of AWS cloud
6
Configure BIOS/UEFI options for OS booting
7
Details discussion about OS booting options
8
Details discussion about Installation Summary
9
Linux Installation Method (MBR and GPT)
10
Configure Post installation on RHEL 8
Section 4
Getting started with Linux
1
The GNOME Desktop Environment
2
Working with terminal and command console
3
Introduction to Linux shells and terminal
4
Linux Virtual Console/Terminal
5
Logging remote system through SSH
6
Logging web interface using cockpit
7
Linux Command Syntax, Options, Argument
8
Examples of Simple Commands
9
Powering Off, Reboot and Logout System
10
Navigating Linux Directory Paths
11
Command-line File & Directory Management
12
Files & Directory handling commands
Section 5
Linux Text Processing Tools
1
Standard Input, Output and Error Concept
2
Redirecting Output to a File
3
Constructing and Using Pipelines
4
Working with Regular Expressions ‘grep’
5
Familiar with Linux ‘find’, ‘ and ‘locate’
6
Documentation for Commands
Section 6
Linux Text Editors
1
Why need text editor
2
Different types of text editors
3
Introduction to ‘vi/vim’ and ‘gedit’
4
Linux Text Editor Utilities (vim, gedit, nano)
5
Working with Different ‘vi/vim’ Modes
6
Editing, Replacing, Searching with ‘vi/vim’
7
Working with ‘vim’ advanced features
Section 7
User and Group Administration
1
Users and Groups Introduction
2
Linux User Types and Database
3
Primary Groups and Supplementary Groups
4
Gaining Super user Access
5
Running commands as root with SUDO
6
Managing Local User Accounts
7
Managing Local Group Accounts
8
Managing User Passwords
9
Managing User’s Password Aging
Section 8
Linux File Permissions and ACL
1
Explore Linux File & Directory Types
2
Linux standard file permissions
3
Hard Link and Soft Link concepts
4
Viewing File/Directory Permission and Ownership
5
Linux User, Group and Other permission Concept
6
Set permission using read, write and execute
7
Linux Special Permissions SUID, SGID, Sticky bit
8
Securing Files with ACLs
9
Creating, modifying and deleting ACL’s
Section 9
Creating
Section 10
modifying and deleting ACL’s
1
Why Need Backup?
2
Different types of Backup method
3
Archive Files and Directories using ‘tar’
4
Discuss about different ‘tar’ options
5
Extract Compressed ‘tar’ Archive
6
Discuss about gz, bz2 and xz Compression
7
Compress and De-compress using ‘gz, bz2, xz’
Section 11
Linux Boot
Section 12
Process and Services
1
Step by step Linux booting procedures
2
Explain and Controlling the Boot Process
3
Working with GRUB2 Boot loader
4
Working with Linux Kernel (CentOS)
5
Update Linux Kernel (CentOS)
6
Introducing RHEL Systemd
7
Controlling RHEL daemon & Services
8
Enabling/Disabling System Daemons at boot
9
Linux process management introduction
10
Parent processes and child processes
11
System process and user processes
12
Details explain of “TOP” command
13
Graphical process monitoring system
14
Background and Foreground Processes
15
Controlling jobs using ‘bg’, ‘fg’, ‘ctrl+z’, ‘ctrl+c’
16
Monitoring & Killing Process Activities
17
Process priority and ‘nice’ concepts
18
Managing priority of Linux Process
Section 13
RHEL File System and SWAP Management
1
Identifying File Systems and Devices
2
Understanding Linux file systems
3
Managing MBR Partitions with ‘fdisk’
4
Managing GPT Partitions with ‘gdisk’
5
Creating File System (xfs, ext4, swap)
6
Mount Points and ‘/etc/fstab’ – Details
7
Mounting and Un-mounting File Systems
8
Working with USB, DVD, ISO, VFAT
9
Why need swap partition
10
Create additional ‘swap’ space
Section 14
Linux LVM Management (LVM)
1
Limitation of Standard Partitions
2
Importance of Logical Volume Management (LVM)
3
Preparing storage partitions for LVM
4
Creating Physical volumes (PV)
5
Creating Volume Group (VG)
6
Creating Logical Volume (LV)
7
Extend Volume Group (VG)
8
Extend Logical Volumes
9
Resizing Logical Volumes
10
Remove Logical Volumes
Section 15
RHEL Network Management (IPv4 & IPv6)
1
Understand Network Device Recognition
2
Working with NetworkManager Services
3
Introducing Network Manager tools (nmcli & nmtui)
4
Configuring Host Name and Name Resolution
5
Working with gateway and route table
6
Static and dynamic Configure Static and dynamic IP
7
Configuring IPv4 Networking using ‘nmtui’
8
Configuring IPv6 Networking ‘nmcli’
9
Advanced configure using ‘vim’ text editor
Section 16
Linux Package Management System
1
Software Packages and RPM
2
The Linux Package Management system
3
Examining RPM Package Files
4
RPM Install, Queries and verifying
5
Dependency problems and Resolution
6
Concept of YUM Repositories and Clients
7
Register system with Red Hat Portal
8
Packages Install and Remove with YUM & DNF
9
Enable Third-party Software Repositories (EPEL)
Section 17
RHEL Virtualization and Container
1
Virtualization Introduction
2
RHEL Virtualization Introduction
3
Working with Linux Qemu-KVM
4
Required resources for RHEL Virtualization
5
Create VM and install new OS
6
Virtualization vs Containerization
7
Red Hat Containerization using Podman
8
Inspect container images
9
Perform basic container management
10
Run a service inside a container
Section 18
CRON Process & Scheduling
1
Introduction to Linux Scheduling
2
Scheduling Recurring Jobs with ‘cron’
3
Scheduling System cron Jobs
4
Explain cron job file format
5
Running commands at particular times
6
Identify various CRON entries and schedules
7
Scheduling Future Linux Tasks
Section 19
Configuring OpenSSH Service
1
What is the Secure Shell (SSH)?
2
How SSH (Secure Shell) works?
3
SSH Host Keyes (Public and Private)
4
Configuring SSH Key-based Authentication
5
Password less SSH Login
6
Customizing SSH Service Configuration
7
Restricting SSH Logins (root)
8
Putty and Open SSH Clients
9
Secure Copy Through ‘scp’
Section 20
Linux Advanced Storage and NFS
1
NFS Server Configuration and NFS Clients
2
Setup an NFS server and export directories
3
Review /etc/exports parameters and options
4
Evaluate access to NFS exports
5
Mount NFS server in NFS clients
6
NFS Server Auto mount
Section 21
Linux Scripting with Bash
1
Introduction to Shell Scripting
2
Creating and Executing First Shell Script
3
Working with Shell Variables
4
Passing Arguments to the Bash Script
5
Executing Shell Commands with Bash
6
Reading User Input in Bash Shell
7
Working with Bash Statement
8
Bash Conditional and Control Structures
9
Working with Login and Non-Login shells
10
System information through bash scripts
Section 22
Linux Firewall and SELinux Security
1
Introduction to Firewall Technologies
2
Netfilter and Firewalld concepts
3
Working with ‘firewalld’ zones concepts
4
Managing & Configure Firewall Settings
5
IP, ICMP, Port, Service Filtering using ‘firewalld’
6
Introducing SELinux Security
7
Explanation of SELinux Modes
8
Working with SELinux Security Context
9
Managing SELinux port Labeling
10
Working with SELinux Boolean
Section 23
Linux System Tuning & Troubleshooting
1
Tuning Operating System
2
Working with Syslog Files
3
Monitor Log Files with ‘tail’
4
Preserving the ‘systemd’ Journal
5
Port monitoring with netstat
6
MTR, Traceroute, TCP dumps, nmap concept
7
Recovering Root Password
8
Recovering GRUB BootLoader
9
Common System Hardening
Questions
My Question
{{ comment.replies_count }}
Send
Load More
Back to Q&A List
Add Comment
{{ message }}
Send
Introduction to UNIX & LINUX
Those Other College Expenses You Aren’t Thinking About
Lesson is locked. Please Buy course to proceed.
Completed
Login
Sign Up
Remember me
Forgot Password?
Sign In
I accept the
Terms of Service and Privacy Policy
Sign Up
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.
Email Reset Link
Login Or Register
Username or Email Address
Password
Remember Me
Log In
Lost your password?
|
Register
Close
Login
Sign Up
Remember me
Forgot Password?
Sign In
I accept the
Terms of Service and Privacy Policy
Sign Up
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.
Email Reset Link
Questions
My Question