Red Hat System Administration II (Virtual Training) (RH134VT-EC)
About this course:
The course is a followup to System Administration I and continues to utilize today's best-of-breed, contemporary teaching methodology. Students will be actively engaged in task-focused activities, lab-based knowledge checks, and facilitative discussions to ensure maximum skills transfer and retention. Building on the foundation of command line skills covered in System Administration I, students will dive deeper into Red Hat Enterprise Linux to broaden their "tool kits" of administration skills. By the end of this five-day course, students will be able to administer and troubleshoot file systems and partitioning, logical volume management, access control, package management.
The average salary for Red Hat System Administrator is $72,762 per year.
After completing this course, students will be able to:
- Network configuration and troubleshooting
- Managing file systems and logical volumes
- Controlling user and file access
- Installing and managing services and processes
- Essential command line operations
- Troubleshooting Controlling user and file access
This course is intended for:
- IT professionals who have attended Red Hat System Administration I and want the skills to be full-time enterprise Linux administrators
- The students should have completed the Red Hat System Administration I course before taking on this course
Suggested prerequisites courses:
Virtual Instructed-Led Outline
Automate installation with Kickstart
- Automate the installation of Red Hat Enterprise Linux systems with Kickstart.
Use regular expressions with grep
- Write regular expressions that, when partnered with grep, will allow you to quickly isolate or locate content within text files.
Create and Edit text files with vim
- Introduce the vim text editor, with which you can open, edit, and save text files.
Schedule future Linux tasks
- Schedule tasks to automatically execute in the future.
Manage priority of Linux processes
- Influence the relative priorities at which Linux processes run.
Control access to files with access control lists (ACL)
- Manage file security using POSIX access control lists.
Manage SELinux security
- Manage the Security Enhanced Linux (SELinux) behavior of a system to keep it secure in case of a network service compromise.
Connect to network-defined users and groups
- Configure systems to use central identity management services.
Add disks, partitions, and file systems to a Linux system
- Manage simple partitions and file systems.
Manage logical volume management (LVM) storage
- Manage logical volumes from the command line.
Access networked attached storage with network file system (NFS)
- Access (secure) NFS shares.
Access networked storage with SMB
- Use autofs and the command line to mount and unmount SMB file systems.
Control and troubleshoot the Red Hat Enterprise Linux boot process
Limit network communication with firewall
- Configure a basic firewall.
- Practice and demonstrate knowledge and skills learned in this course
|Subjects||IT Ops & Management|
|Learning Style||Virtual Classroom|
|Course Duration||5 Days|
Based on the information taught in this course, you may be interested in the following related courses: