Join With Our Courses To Develop Yourself.
RH124: Red hat System Administration I
1. Access the command line
Log in to a Linux system and run simple commands using the shell.
2. Manage files from the command line
Copy, move, create, delete, and organize files from the bash shell prompt.
3.Get help with Red Hat Enterprise Linux
Take care of issues utilizing on the web encourage frameworks and Red Hat bolster utilities.
4. Make, see and alter content documents
Make, see and alter content records in charge yield or proofreader.
Manage local Linux users and groups
Manage local Linux users and groups, and manage local password policies.
6. Control access to files with Linux file system permissions
Set up the Linux file system permissions on files and explain the security effects of the various
7. Monitor and manage Linux processes
Get information about the system, and control the processes running on it.
8. Control Services and Demons
Control and screen organize administrations and framework daemons utilizing Systemd
9. Design and Secure OpenSSH Service
Give Access and Access to the Command Line on Remote Systems Using Safely
10. Dissect and Store Logs
Recognize and precisely decipher pertinent framework log records for critical thinking purposes.
11. Oversee Red Hat Enterprise Linux Networking
Design local IPv4 organizing on the Red Hat Enterprise Linux framework.
12. Store and duplicate documents between frameworks
File documents and duplicate them starting with one framework then onto the next.
13. Introduce and refresh programming bundles
Download, install, update, and manage software packages from Red Hat and yum package
14. Access Linux file systems
Access and inspect the existing file system on a Red Hat Enterprise Linux system.
15. Use virtualized system
Create and use a Red Hat Enterprise Linux virtual machine with KVM and libvirt.
16. Extensive review
Practice and show the information and abilities learned in this course.
RH 134: Red Hat System Administration II
1. Programmed establishment with kickstart
Robotize the establishment of Red Hat Enterprise Linux frameworks with kickstart.
2. Utilize standard articulations with grep
Write regular expressions that, when partnering with grep, you will get permission quickly
Find or locate content within text files
3. Create and Edit text files with vim
The Introduce the vim text editor, with which you can open, edit, and save text files.
4. Schedule future Linux tasks
Schedule future Linux tasks
Schedule tasks to perform automatically in the future.
5. Manage Priority of Linux Processes
Influence Relative Priorities Running Linux Processes
6. Control access to files with access control lists (ACL)
Manage file security using POSIX access control lists.
7. Manage SELinux security
To keep this safe, manage the system's Security Enhanced Linux (SELinux) behavior
The issue of network service agreement.
8. Connect to network-defined users and groups
Configure the system to use central identity management services.
9. Add disks, partitions, and file systems to a Linux system
Manage simple partitions and file systems.
10. Manage logical volume management (LVM) storage
Manage logical volumes from the command line.
11. Access networked attached storage with network file system (NFS)
Access (secure) NFS shares.
12. Access networked storage with SMB
Use Control the Red Hat Enterprise Linux boot process and limit the troubleshooting network
Communication with firewalls
Configure a basic firewall.
Practice and demonstration of knowledge and skills learned in this course.
RH 254: Red Hat System Administration III
1. Control Services and Demons
Audit how administrations and framework administration utilizing Systemctl are taken care of
2. Oversee IPv6 organizing
Design and investigate essential IPv6 organizing on Red Hat Enterprise Linux frameworks
3. Arrange Link Aggregation and Bridging
Arrange and investigate propelled organize interface usefulness, including authoritative,
Joining, and nearby programming spans
4. System port security control
Permit and deny arrange access to cutting edge SELinux and firewalld
5. Oversee DNS for server
Set and check the right DNS records for the framework and design secure DNS reserving
6. Design email conveyance
Hand-off all messages sent by the framework to the focal dissemination on the SMTP Gateway
7. Give square based stockpiling
Give and utilize organized iSCSI square gadgets as remote circles
8. Give document based capacity
Give NFS fare and SMB document offer to particular frameworks and clients
9. Arrange Mariadi databases
Give MariadiB SQL database to use by program and database directors
10. Give Apache HTTPD Web Service
Transport Layer Security (TLS) - Configure Apache HTTPD to Provide Enabled Websites
What's more, virtual host
11. Compose Bash content
Compose basic shell content utilizing Bash
12. Bash restrictive and control structures
Use Bash conditionals and other control structures to write more sophisticated shell
commands and scripts
13. Configure the shell environment
Customize Bash startup and use environment variables, Bash aliases, and Bash functions
14. Linux containers preview
Review the capacities of Linux holders, dockers and other related innovations
Red Hat Enterprise Linux 7
15. Broad audit
Practice and execution of information and aptitudes learned in Red Hat framework organization