Linux RHCSA Training
International Certification : Red Hat Certified System Administrator (RHCSA) by Red Hat.
RHCSA is an entry-level certification that focuses on actual competencies at system administration, including installation and configuration of a Red Hat Enterprise Linux system and attach it to a live network running network services.Red Hat certification vets essential skills in handling files, working at the command line and using system documentation, along with managing systems (boot-up, identifying processes, start/stop virtual machines, controlling systems), configuring storage partitions and logical volumes and more.
TOPS Technologies has a designed a simple way of making students/profesionals learn the fundamentals, such as basic shell commands, creating and modifying users, and changing passwords. The course will then teach you about the shell, explaining how to manage files, use the stream editor, and locate files.
By the end of this course from TOPS Technologies a student/profesional will be able to achieve the following:
1. Able to Operate running systems, including booting into different run levels, identifying processes, starting and stopping virtual machines, and controlling services.
2. Manage security, including basic firewall and SELinux configuration.
3. Deploy, configure, and maintain systems, including software installation, update, and core services.
4. Create and configure file systems and file system attributes, such as permissions, encryption, access control lists, and network file systems
RH124: Red Hat System Administration – I
- Access the command line
– Log in to a Linux system and run simple commands using the shell.
- Manage files from the command line
– Copy, move, create, delete, and organize files from the bash shell prompt.
- Get help in Red Hat Enterprise Linux
– Resolve problems by using online help systems and Red Hat support utilities.
- Create, view, and edit text files
– Create, view, and edit text files from command output or in an editor.
- Manage local Linux users and groups
– Manage local Linux users and groups, and administer local password policies. Control access to files with Linux file system permissions Set Linux file system permissions on files and interpret the security effects of different permission settings.
- Monitor and manage Linux processes
– Obtain information about the system, and control processes running on it.
- Control services and daemons
– Control and monitor network services and system daemons using system
- Configure and secure OpenSSH service
– Access and provide access to the command line on remote systems securely using OpenSSH.
- Analyze and store logs
– Locate and accurately interpret relevant system log files for troubleshooting purposes.
- Manage Red Hat Enterprise Linux networking
– Configure basic IPv4 networking on Red Hat Enterprise Linux systems
- Archive and copy files between systems
– Archive files and copy them from one system to another.
- Install and update software packages
– Download, install, update, and manage software packages from Red Hat and yum package repositories.
- Access Linux file systems
– Access and inspect existing file systems on a Red Hat Enterprise Linux system.
- Use virtualized systems
– Create and use Red Hat Enterprise Linux virtual machines with KVM and libvirt.
RH134: Red Hat System Administration – II
- Automate installation with Kickstart
Automate the installation of Red Hat Enterprise Linux systems with Kickstart.
- Use regular expressions with grep
Write regular expressions that, when partnered with grep, will allow you to quickly isolate or locate content within text files.
- Create and Edit text files with vim
Introduce the vim text editor, with which you can open, edit, and save text files.
- Schedule future Linux tasks
Schedule tasks to automatically execute in the future.
- Manage priority of Linux processes
Influence the relative priorities at which Linux processes run.
- Control access to files with access control lists (ACL)
Manage file security using POSIX access control lists.
- Manage SELinux security
Manage the Security Enhanced Linux (SELinux) behavior of a system to keep it secure in case of a network service compromise.
- Connect to network-defined users and groups
Configure systems to use central identity management services.
- Add disks, partitions, and file systems to a Linux system
Manage simple partitions and file systems.
- Manage logical volume management (LVM) storage
Manage logical volumes from the command line.
- Access networked attached storage with network file system (NFS)
Access (secure) NFS shares.
- Access networked storage with SMB
Use autofs and the command line to mount and unmount SMB file systems.
- Control and troubleshoot the Red Hat Enterprise Linux boot process
- Limit network communication with firewall
Configure a basic firewall.