Red Hat 7 System Administration - Part 2

This course is designed for students who already have some Red Hat 7 experience and want to progress further, perhaps towards the RHCSA exam in future.

Prerequisites

The course assumes delegates have attended the Red Hat 7 System Administration - Part 1 course and, therefore, already have some experience using Red Hat 7 Linux.

Program

Linux is heavily relied upon in business, education and government. Due to its outstanding reliability, performance and low cost, Linux is being used extensively for file, database and web server applications. Of all the various Linux systems available, Red Hat Enterprise Linux has become the corporate Linux standard.

This Red Hat 7 System Administration course is aimed at users and administrators who need to manage Enterprise Linux systems, not just Red Hat but also any of the rebuild projects like CentOS and Scientific Linux.

The course will teach students intermediate Enterprise Linux administration techniques, including; task automation, access control and advanced filesystem configuration.

You will learn

  • Automate Installation with Kickstart: Automate the installation of Red Hat Enterprise Linux systems with Kickstart.
  • Use Regular Expressions with Grep: Write regular expressions that, when partnered with grep, will allow you to quickly isolate or locate content within text files.
  • Create and Edit Text Files with Vim: Introduce the vim text editor, with which you can open, edit, and save text files.
  • Schedule Future Linux Tasks: Schedule tasks to automatically execute in the future.
  • Manage the Priority of Linux Processes: Influence the relative priorities at which Linux processes run.
  • Control Access to Files with Access Control Lists (ACL): Manage file security using POSIX access control lists.
  • Manage SELinux Security: Manage the Security Enhanced Linux (SELinux) behavior of a system to keep it secure in case of a network service compromise.
  • Connect to Network-Defined Users and Groups: Configure systems to use central identity management services.
  • Add Disks, Partitions, and Filesystems to a Linux System: Manage simple partitions and filesystems.
  • Manage Logical Volume Management (LVM) Storage
  • Access Networked Attached Storage with Network Filesystem (NFS): Access (secure) NFS shares.
  • Access Networked Storage with SMB: Use autofs and the command line to mount and unmount SMB filesystems.
  • Control and Troubleshoot the Red Hat Enterprise Linux Boot Process: Troubleshooting GRUB2 and systemd.
  • Limit Network Communication using a Firewall: Configure a basic firewall.