sysadmin

Red Hat System Administration

Course Details

Red Hat System Administration is designed for IT professionals without previous Linux system administration experience. The course provides students with Linux administration “survival skills” by focusing on core administration tasks. This curriculum also provides a foundation for students planning to become full-time Linux system administrators by introducing key command-line concepts and enterprise-level tools.

This course goes deeper into enterprise Linux administration including file systems and partitioning, logical volumes, SELinux, firewalling, and troubleshooting.

Prerequisites
    1. Access the command line.
    2. Manage files from command line.
    3. Create, view, and edit text files.
    4. Manage local users and groups.
    5. Monitor and manage Linux processes.
    6. Control services and daemons.
    7. Control access to files with file system permissions.
    8. Analyze and store log files.
    9. Configure and secure the OpenSSH service.
    10. Install and update software packages.
    11. Access Linux file systems.
    12. Manage Linux networking.
Automate installation with Kickstart
    1. Automate the installation of Red Hat Enterprise Linux systems with Kickstart.
Use regular expressions with grep
    1. Write regular expressions that, when partnered with grep, will allow you to quickly isolate or locate content within text files.
Create and Edit text files with vim
    1. Introduce the vim text editor, with which you can open, edit, and save text files.
Schedule future Linux tasks
    1. Schedule tasks to automatically execute in the future.
Manage priority of Linux processes
    1. Influence the relative priorities at which Linux processes run.
Control access to files with access control lists (ACL)
    1. Manage file security using POSIX access control lists.
Manage SELinux security
    1. Manage the Security Enhanced Linux (SELinux) behavior of a system to keep it secure in case of a network service compromise.
Connect to network-defined users and groups
    1. Configure systems to use central identity management services.
Add disks, partitions, and file systems to a Linux system
    1. Manage simple partitions and file systems.
Manage logical volume management (LVM) storage
    1. Manage logical volumes from the command line.
Access networked attached storage with network file system (NFS)
    1. Access (secure) NFS shares.
Access networked storage with SMB
    1. Use autofs and the command line to mount and unmount SMB file systems.
Limit network communication with firewall
    1. Configure a basic firewall.