0% found this document useful (0 votes)
262 views2 pages

Red Hat System Administration I - RH124: Course Outline

The Red Hat System Administration I course teaches students to perform essential Linux system administration tasks through the command line, including managing users and permissions, processes, services, networking, software packages and file systems. It covers accessing and helping resources, creating and editing text files, installing and updating software, and using virtual machines. The course concludes with a comprehensive skills review.

Uploaded by

Shreyash Mahadik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
262 views2 pages

Red Hat System Administration I - RH124: Course Outline

The Red Hat System Administration I course teaches students to perform essential Linux system administration tasks through the command line, including managing users and permissions, processes, services, networking, software packages and file systems. It covers accessing and helping resources, creating and editing text files, installing and updating software, and using virtual machines. The course concludes with a comprehensive skills review.

Uploaded by

Shreyash Mahadik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Red Hat System Administration I - RH124

Course outline

Access the command line


Log in to a Linux system and run simple commands using the shell.

Manage files from the command line


Copy, move, create, delete, and organize files from the bash shell prompt.

Get help in Red Hat Enterprise Linux


Resolve problems by using online help systems and Red Hat support utilities.

Create, view, and edit text files


Create, view, and edit text files from command output or in an editor.

Manage local Linux users and groups


Manage local Linux users and groups, and administer local password policies.

Control access to files with Linux file system permissions


Set Linux file system permissions on files and interpret the security effects of different permission
settings.

Monitor and manage Linux processes


Obtain information about the system, and control processes running on it.

Control services and daemons


Control and monitor network services and system daemons using system.

Configure and secure OpenSSH service


Access and provide access to the command line on remote systems securely using OpenSSH

Analyze and store logs


Locate and accurately interpret relevant system log files for troubleshooting purposes.

Manage Red Hat Enterprise Linux networking


Configure basic IPv4 networking on Red Hat Enterprise Linux systems.

Archive and copy files between systems


Archive files and copy them from one system to another.

Install and update software packages


Download, install, update, and manage software packages from Red Hat and yum package repositories.

Access Linux file systems


Access and inspect existing file systems on a Red Hat Enterprise Linux system.

Use virtualized systems


Create and use Red Hat Enterprise Linux virtual machines with KVM and libvirt.

Comprehensive review
Practice and demonstrate the knowledge and skills learned in this course.
Red Hat System Administration II with RHCSA
Exam - RH134
Course outline

Automate installation with Kickstart


Automate the installation of Red Hat Enterprise Linux systems with Kickstart.

Use regular expressions with grep


Write regular expressions that, when partnered with grep, will allow you to quickly isolate or locate
content within text files.

Create and Edit text files with vim


Introduce the vim text editor, with which you can open, edit, and save text files.

Schedule future Linux tasks


Schedule tasks to automatically execute in the future.

Manage priority of Linux processes


Influence the relative priorities at which Linux processes run.

Control access to files with access control lists (ACL)


Manage file security using POSIX access control lists.

Manage SELinux security


Manage the Security Enhanced Linux (SELinux) behavior of a system to keep it secure in case of a
network service compromise.

Connect to network-defined users and groups


Configure systems to use central identity management services.

Add disks, partitions, and file systems to a Linux system


Manage simple partitions and file systems.

Manage logical volume management (LVM) storage


Manage logical volumes from the command line.

Access networked attached storage with network file system (NFS)


Access (secure) NFS shares.

Access networked storage with SMB


Use autofs and the command line to mount and unmount SMB file systems.

Control and troubleshoot the Red Hat Enterprise Linux boot process
Limit network communication with firewall
Configure a basic firewall.

Comprehensive review
Practice and demonstrate knowledge and skills learned in this course.

203,RATNMANI BLDG, DADA PATIL WADI, OPP ICICI ATM, THANE WEST
WEB : www.nettechindia.com Phone : 9870803004/ 9870803005

You might also like