The document outlines the modules of the Red Hat Certified System Administrator course. The 11 modules cover topics such as installing and configuring Red Hat Linux, managing system processes and services, file system management, user and group management, and managing the firewall. Specific topics include the Red Hat boot process, package management with RPM and YUM, monitoring system resources, and SELinux security contexts.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
118 views3 pages
Red Hat Certified System Administrator
The document outlines the modules of the Red Hat Certified System Administrator course. The 11 modules cover topics such as installing and configuring Red Hat Linux, managing system processes and services, file system management, user and group management, and managing the firewall. Specific topics include the Red Hat boot process, package management with RPM and YUM, monitoring system resources, and SELinux security contexts.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3
RED HAT CERTIFIED SYSTEM ADMINISTRATOR
Module 1: Introduction to Red Hat
• History of Red Hat Linux • Features of Linux • Benefits of Open Source Distributions • Distributions of Linux Operating System
Module 2: Installation of Red Hat Linux
• Hardware Requirements for Red Hat Linux • Pre-Installation Configuration • Installation method for Red Hat Linux e.g. GUI, CLI, NFS, FTP • Post Installation Configuration
• Check LAN card driver is installed or not • How to install LAN card driver in Linux • How to use Linux as router • Configure Red Hat Server to deny ICMP ping request • Check proper IP configuration • IPv4 Interface configuration • Defining Local Hostname • Check /etc/hosts files for name resolution • Introduction the Network Utilities • Verifying the Connectivity
Module 5: Package Management in Red Hat Server
• Package Management thru RPM Commands • Configuration of YUM Server • Package Management thru YUM Server • Deploying and Managing Red Hat Network
Module 6: Monitoring System Resources
• Basic Concept • System Performance Monitoring • Monitoring CPU Performance • Monitoring System Memory • Monitoring Disk Utilization • Monitoring Disk I/O • Monitoring User Activity • Monitoring Network Performance
Module 7: Process Management
• Introduction to Process States • Background Processes • Foreground Processes • Difference between Process and Daemons • Commands for Process Management • Nice and Renice Commands • Killing the Processes • Introduction to Crontab Scheduler • Scheduling Jobs thru Crontab • Examples of Crontab Scheduling Methods
Module 8: Managing System Services
• Managing Services with service, systemctl command • Understand the Run Levels and rc.d scripts • Check the configuration of /etc/initab file • Use of Chkconfig Command • Creating the Service for third party application • Configure General Services Like, SSH, rsync, Telnet, NTP, and VNC
Module 9: File system Management
• Understand the Disk Architecture • Introduction to File System • How File System Works? • How Red Hat Recognize the Disks • Disk Partitioning with MBR • Creating the File System on the Partition • Mounting/Unmouting the File System • Introduction to /etc/fstab • Using UUID to put the entry in /etc/fstab • Introduction to GPT Partition • How to create partitions with GPT method • Introduction to File System Commands e.g. tune2fs
Module 10: User and Group Management
• Creating Users/Groups on Red Hat Linux • Understand the Process of Creating Users/Groups • Modifying/Deleting Users/Groups • How GID/UID is generated? • How to define Password to Users • Password Aging Policies and Encryption Methods of Password • Multiple User creation commands • Creating the SUDO Users • Default File and Directory Permission (UMASK) • Special Permission e.g. SUID, SGID and Sticky Bit
Module 11: Managing SELinux
• Introduction to SELinux • SELinux Security Context • SELinux Target Policy • SELinux Management • SELinux semanage • SELinux File Types Module 19: Managing IPTABLES/Firewalld • Introduction to IPTABLES • Netfilter Tables and Chains • Netfilter Packet Flow • Rule Machine • Rule Targets • Simple Example • Introduction to Firewalld • Discussing Firewalld Components • Creating Own Services in Firewalld • Entire Firwalld Management Commands