Red Hat Enterprise System Administration: Levels One & Two
RED HAT ENTERPRISE SYSTEM ADMINISTRATION – LEVEL ONE COURSE OUTLINE
COURSE DURATION: 5 DAYS
The topics covered include essential command line tools, installing RHEL, remote administration techniques, managing local storage, system monitoring, basic user and security, administration, connecting to a network and deploying FTP and Web servers.
Prerequisites:
Students must be proficient in general computing skills but not necessarily experienced with Linux or Unix.
Supported Distributions:
Red Hat Enterprise Linux 8
Course Outline:
1. ACCESS THE COMMAND LINE
1. Components of a Distribution
2. Red Hat Linux Products
3. Logging In
4. Running Programs
5. Interacting with Command Line
6. Desktop Environments
7. GNOME
8. got root?
9. Switching User Contexts
10. sudo
11. Login and Discovery
12. Switching Users With su
2. MANAGE FILES FROM THE COMMAND LINE
1. Managing Files Graphically
2. Drag and drop with Nautilus
3. Physical Unix File Structure
4. Unix/Linux Filesystem Features
5. Navigating the Filesystem
6. Displaying Directory Contents
7. Directory Manipulation
8. File Manipulation
9. Deleting and Creating Files
10. Filesystem Links
11. Navigating Directories and Listing Files
12. Manipulating Files and Directories
3. GET HELP IN A TEXTUAL ENVIRONMENT
1. Gathering Login Session Info
2. Red Hat Online Documentation
3. Getting Help Within the Graphical Desktop
4. Gathering System Info
5. Help from Commands and Documentation
6. Getting Help with man & info
7. $MANPATH, whatis and apropos
8. Help with Commands
4. CREATE, VIEW, AND EDIT TEXT FILES
1. The gedit Text Editor
2. Pico/GNU Nano
3. Pico/Nano Interface
4. Nano configuration
5. Pico/Nano Shortcuts
6. Communication Channels
7. File Redirection
8. Piping Commands Together
9. The Streaming Editor
10. Text Processing with Awk
11. Producing File Statistics
12. Replacing Text Characters
13. Text Sorting
14. Duplicate Removal Utility
15. Extracting Columns of Text
16. Combining Files and Merging Text
17. Comparing File Changes
18. Text Editing with Nano
19. Text Processing
5. MANAGE LOCAL LINUX USERS AND GROUPS
1. User and Group Concepts
2. User Administration
3. Modifying Accounts
4. Group Administration
5. User Private Group Scheme
6. Password Aging
7. User and Group Administration
8. User Private Groups
6. CONTROL ACCESS TO FILES WITH LINUX FILE SYSTEM PERMISSIONS
1. File Ownership
2. File and Directory Permissions
3. SUID and SGID on files
4. SGID and Sticky Bit on Directories
5. Changing File Permissions
6. File and Directory Ownership and Permissions
7. MONITOR AND MANAGE LINUX PROCESSES
1. What is a Process?
2. Process States
3. Viewing Processes
4. System Status – CPU
5. System Status – Memory
6. Signals
7. Tools to Send Signals
8. Managing Processes
9. Tuning Process Scheduling
10. Job Control Overview
11. Job Control Commands
12. Job Control Basics
13. Process Management Basics
8. CONTROL SERVICES AND DAEMONS
1. init
2. Linux Runlevels Aliases
3. systemd System and Service Manager
4. systemd Targets
5. Using systemd
6. Legacy Support for SysV init
7. Managing Services With Systemd's systemctl
8. Creating a systemd unit file
9. CONFIGURE AND SECURE OPENSSH SERVICE
1. Secure Shell
2. OpenSSH Client & Server Configuration
3. Accessing Remote Shells
4. Transferring Files
5. Alternative sftp Clients
6. SSH Key Management
7. ssh-agent
8. Introduction to ssh and scp
9. SSH Key-based User Authentication
10. Using ssh-agent
10. ANALYZING AND STORING LOGS
1. System Logging
2. systemd Journal
3. systemd Journal's journalctl
4. Secure Logging with Journal's Log Sealing
5. Cockpit - Logs
6. Syslog-ng
7. Rsyslog
8. /etc/rsyslog.conf
9. Log Management
10. Log Anomaly Detector
11. Hardware and System Clock
12. Time Synchronization with Chronyd
13. Using the systemd Journal
14. Setting up a Full Debug Logfile
15. Remote Syslog Configuration
11. MANAGE RED HAT ENTERPRISE LINUX NETWORKING
1. IPv4 Fundamentals
2. TCP/UDP Fundamentals
3. IPv6
4. Linux Network Interfaces
5. Ethernet Hardware Tools
6. Network Configuration with ip Command
7. Starting and Stopping Interfaces
8. Configuring Routing Tables
9. IP to MAC Address Mapping with ARP
10. DNS Clients
11. DHCP Clients
12. Continual Time Sync with NTP
13. Network Diagnostics
14. NetworkManager
15. Network Discovery
16. Basic Client Networking
17. Introduction to Troubleshooting Labs
18. Troubleshooting Practice: Networking
12. ARCHIVE AND COPY FILES BETWEEN SYSTEMS
1. Archives with tar
2. Archives with cpio
3. The gzip Compression Utility
4. The bzip2 Compression Utility
5. The XZ Compression Utility
6. The PKZIP Archiving/Compression format
7. Archiving and Compression
8. Using rsync and ssh for Backups
13. INSTALL AND UPDATE SOFTWARE PACKAGES
1. Managing Software
2. RPM Features
3. RPM Architecture
4. RPM Package Files
5. Working With RPMs
6. Querying and Verifying with RPM
7. Managing Software Dependencies
8. Using the Yum & DNF commands
9. Yum package groups
10. Updating the Kernel RPM
11. Dealing With RPM & Yum Digest Changes
12. DNF Repositories
13. DNF Repository Groups
14. DNF Plugins & RHSM Subscription Manager
15. DNF Version Lock Plugin
16. Managing Software with RPM
17. Querying the RPM Database
18. Using Yum
14. ACCESS LINUX FILE SYSTEMS
1. Filesystem Creation
2. Mounting Filesystems
3. Mounting Filesystems
4. Filesystem Maintenance
5. Managing an XFS Filesystem
6. Persistent Block Devices
7. Filesystem Structures
8. Determining Disk Usage With df and du
9. Filesystem Table (/etc/fstab)
10. Creating and Managing Filesystems
15. MANAGE VIRTUAL MACHINES
1. Introducing libvirt
2. libvirt: Basic Concepts
3. libvirt: Storage Architecture
4. libvirt: Network Architecture
5. libvirt: Graphical Tools
6. libvirt: Command Line Tools
7. virsh: Basics
8. virsh: Common Tasks
9. virt-install
10. Virtual Machine Guest Tools & Drivers
11. libguestfs and guestfish
12. Installing a Virtual Machine
16. COMPREHENSIVE REVIEW
1. System Administration I
2. Understand And Use Essential Tools
3. Operate Running Systems
4. Users, Groups, and File Permissions
RED HAT ENTERPRISE SYSTEM ADMINISTRATION – LEVEL TWO COURSE OUTLINE
COURSE DURATION: 5 DAYS
The topics covered include automating installation with Kickstart, intermediate and advanced level command line building blocks and tools, troubleshooting, network file sharing server configuration, connecting to a directory service, managing advanced security settings, maintenance tasks, and kernel tuning.
Note: This course, along with Red Hat System Administration Level One, prepares students for the RHCSA Red Hat Certified System Administrator exam EX-200.
Prerequisites:
Red Hat System Administration Level One or equivalent industry experience.
Course Outline:
1. AUTOMATED INSTALLATION WITH KICKSTART
1. Kickstart
2. Anaconda: An Overview
3. Anaconda: Booting the System
4. Anaconda: Common Boot Options
5. Anaconda: Loading Anaconda and Packages
6. Anaconda: Storage Options
7. Anaconda: Troubleshooting
8. Linux Installation
9. Automating Installation with Kickstart
2. USE REGULAR EXPRESSIONS WITH GREP
1. Searching Inside Files
2. The Streaming Editor
3. Regular Expression Overview
4. Regular Expression Implementations
5. Regular Expressions
6. RE Character Classes
7. Regex Quantifiers
8. RE Parenthesis
9. Pattern Matching with Regular Expressions
10. Extended Regular Expressions
11. Using Regular Expressions With sed
3. CREATE AND EDIT TEXT FILES WITH VIM
1. Text Editing
2. vi and Vim
3. Learning Vim
4. Basic vi
5. Intermediate vi
6. Text Editing with Vim
4. SCHEDULE FUTURE LINUX TASKS
1. Automating Tasks
2. at/batch
3. cron
4. The crontab Command
5. crontab Format
6. /etc/cron.*/ Directories
7. Anacron
8. Systemd Timers
9. Creating and Managing User Cron Jobs
10. Adding System cron Jobs
5. MANAGE PRIORITY OF LINUX PROCESSES
1. Viewing Processes
2. Managing Processes
3. Tuning Process Scheduling
4. Process Management Basics
6. CONTROL ACCESS TO FILES WITH ACCESS CONTROL LISTS (ACL)
1. File and Directory Permissions
2. File Access Control Lists
3. Manipulating FACLs
4. Viewing FACLs
5. Backing Up FACLs
6. Using Filesystem ACLs
7. MANAGE SELINUX SECURITY
1. SELinux Security Framework
2. SELinux Modes
3. SELinux Commands
4. Choosing an SELinux Policy
5. SELinux Booleans
6. Permissive Domains
7. SELinux Policy Tools
8. SELinux Troubleshooting
9. SELinux Troubleshooting Continued
10. Exploring SELinux Modes
11. SELinux File Contexts
8. CONNECT TO NETWORK-DEFINED USERS AND GROUPS
1. RHEL DS Client Configuration
2. System Security Services Daemon (SSSD)
3. Using LDAP for Centralized User Accounts
9. ADD DISKS, PARTITIONS, AND FILE SYSTEMS TO A LINUX SYSTEM
1. Partitioning Disks with fdisk & gdisk
2. Resizing a GPT Partition with gdisk
3. Partitioning Disks with parted
4. Non-Interactive Disk Partitioning with sfdisk
5. Filesystem Creation
6. Filesystem Maintenance
7. Managing an XFS Filesystem
8. Swap
9. Creating and Managing Filesystems
10. Hot Adding Swap
10. MANAGE LOGICAL VOLUME MANAGEMENT (LVM) STORAGE
1. Logical Volume Management
2. Implementing LVM
3. Creating Logical Volumes
4. Activating LVM VGs
5. Exporting and Importing a VG
6. Examining LVM Components
7. Changing LVM Components
8. Advanced LVM Overview
9. Advanced LVM: Components & Object Tags
10. Advanced LVM: Automated Storage Tiering
11. Advanced LVM: Thin Provisioning
12. Advanced LVM: Striping & Mirroring
13. Advanced LVM: RAID Volumes
14. Creating and Managing LVM Volumes
11. ACCESS NETWORKED ATTACHED STORAGE WITH NETWORK FILE SYSTEM (NFS)
1. File Sharing via NFS
2. NFSv4+
3. NFS Clients
4. NFS
5. NFS Server Configuration
6. NFS Server Configuration
12. ACCESS NETWORKED ATTACHED STORAGE WITH SMB
1. Accessing Windows/Samba Shares from Linux
2. AutoFS
3. AutoFS Configuration
4. Using autofs
13. CONTROL AND TROUBLESHOOT THE RED HAT ENTERPRISE LINUX BOOT PROCESS
1. System Boot Method Overview
2. systemd System and Service Manager
3. Modifying systemd services
4. Systemd Service Sandboxing Features
5. systemd Targets
6. Using systemd
7. Legacy Support for SysV init
8. Booting Linux on PCs
9. GRUB 2
10. GRUB 2 Configuration
11. The Boot Loader Specification
12. GRUB 2 Security
13. Boot Parameters
14. Initial RAM Filesystem
15. init
16. Linux Runlevels Aliases
17. Systemd local-fs.target and sysinit.target
18. Systemd basic.target and multi-user.target
19. Legacy local bootup script support
20. System Configuration Files
21. RHEL8 Configuration Utilities
22. Shutdown and Reboot
23. Boot Process
24. Booting directly to a bash shell
25. GRUB Command Line
26. Basic GRUB Security
27. Managing Services With Systemd's systemctl
28. Creating a systemd unit file
29. Troubleshooting Practice: Boot Process
14. LINUX NETWORK COMMUNICATION WITH FIREWALL
1. Netfilter: Stateful Packet Filter Firewall
2. Netfilter Concepts
3. Using the iptables Command
4. Netfilter Rule Syntax
5. Targets
6. Common match_specs
7. Extended Packet Matching Modules
8. Connection Tracking
9. FirewallD
10. Securing Services with Netfilter
11. FirewallD
15. CONTAINER TECHNOLOGY OVERVIEW
1. Container Fundamentals
2. Daemonless Containers
3. Podman
4. Podman Configuration
5. Podman Images
6. Podman Volumes
7. Podman Networking
8. Rootless Podman
9. Podman and Pods
10. Building Images with Buildah
11. Managing Images with Skopeo
12. Podman
13. Podman Networking
14. Podman and Pods
16. COMPREHENSIVE REVIEW
1. System Administration II
2. Understand And Use Essential Tools
3. Operate Running Systems
4. Configure Local Storage and Filesystems
5. Users, Groups, and File Permissions
6. Maintenance and Recovery