0% found this document useful (0 votes)
227 views

Red Hat System Administration Objectives

This document outlines the objectives and contents of a Red Hat System Administration I training course. The course contains 17 chapters that cover topics such as accessing and using the Linux command line, managing files and users, installing and updating software packages, and configuring networking and security. Each chapter contains multiple sections that break down the chapter content in more detail.

Uploaded by

Raghvendra Shahi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
227 views

Red Hat System Administration Objectives

This document outlines the objectives and contents of a Red Hat System Administration I training course. The course contains 17 chapters that cover topics such as accessing and using the Linux command line, managing files and users, installing and updating software packages, and configuring networking and security. Each chapter contains multiple sections that break down the chapter content in more detail.

Uploaded by

Raghvendra Shahi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

Red Hat System Administration I (RHEL8) - Objective

Chapter 1: Getting Started with Red Hat Enterprise Linux

Section 1.1: What is Linux?

Section 1.2: Quiz: Getting Started with Red Hat Enterprise Linux

Section 1.3: Summary

Chapter 2: Accessing the Command Line

Section 2.1: Accessing the Command Line

Section 2.2: Quiz: Accessing the Command Line

Section 2.3: Accessing the Command Line Using the Desktop

Section 2.4: Guided Exercise: Accessing the Command Line Using the Desktop

Section 2.5: Executing Commands Using the Bash Shell

Section 2.6: Quiz: Executing Commands Using the Bash Shell

Section 2.7: Lab: Accessing the Command Line

Section 2.8: Summary

Chapter 3: Managing Files From the Command Line

Section 3.1: Describing Linux File System Hierarchy Concepts

Section 3.2: Quiz: Describing Linux File System Hierarchy Concepts

Section 3.3: Specifying Files by Name

Section 3.4: Quiz: Specifying Files by Name

Section 3.5: Managing Files Using Command-line Tools

Section 3.6: Guided Exercise: Managing Files Using Command-line Tools

Section 3.7: Making Links Between Files

Section 3.8: Guided Exercise: Making Links Between Files

Section 3.9: Matching File Names with Shell Expansions

Section 3.10: Quiz: Matching File Names with Shell Expansions

Section 3.11: Lab: Managing Files from the Command Line

Section 3.12: Summary

Chapter 4: Getting Help in Red Hat Enterprise Linux

Section 4.1: Reading Manual Pages

Section 4.2: Guided Exercise: Reading Manual Pages

Section 4.3: Reading Info Documentation


Section 4.4: Guided Exercise: Reading Info Documentation

Section 4.5: Lab: Getting Help in Red Hat Enterprise Linux

Section 4.6: Summary

Chapter 5: Creating, Viewing, and Editing Text Files

Section 5.1: Redirecting Output to a File or Program

Section 5.2: Quiz: Redirecting Output to a File or Program

Section 5.3: Editing Text Files from the Shell Prompt

Section 5.4: Guided Exercise: Editing Text Files from the Shell Prompt

Section 5.5: Changing the Shell Environment

Section 5.6: Guided Exercise: Changing the Shell Environment

Section 5.7: Lab: Creating, Viewing, and Editing Text Files

Section 5.8: Summary

Chapter 6: Managing Local Users and Groups

Section 6.1: Describing User and Group Concepts

Section 6.2: Quiz: Describing User and Group Concepts

Section 6.3: Gaining Superuser Access

Section 6.4: Guided Exercise: Gaining Superuser Access

Section 6.5: Managing Local User Accounts

Section 6.6: Guided Exercise: Managing Local User Accounts

Section 6.7: Managing Local Group Accounts

Section 6.8: Guided Exercise: Managing Local Group Accounts

Section 6.9: Managing User Passwords

Section 6.10: Guided Exercise: Managing User Passwords

Section 6.11: Lab: Managing Local Users and Groups

Section 6.12: Summary

Chapter 7: Controlling Access to Files

Section 7.1: Interpreting Linux File System Permissions

Section 7.2: Quiz: Interpreting Linux File System Permissions

Section 7.3: Managing File System Permissions from the Command Line

Section 7.4: Guided Exercise: Managing File System Permissions from the Command Line

Section 7.5: Managing Default Permissions and File Access


Section 7.6: Guided Exercise: Managing Default Permissions and File Access

Section 7.7: Lab: Controlling Access to Files

Section 7.8: Summary

Chapter 8: Monitoring and Managing Linux Processes

Section 8.1: Listing Processes

Section 8.2: Quiz: Listing Processes

Section 8.3: Controlling Jobs

Section 8.4: Guided Exercise: Controlling Jobs

Section 8.5: Killing Processes

Section 8.6: Guided Exercise: Killing Processes

Section 8.7: Monitoring Process Activity

Section 8.8: Guided Exercise: Monitoring Process Activity

Section 8.9: Lab: Monitoring and Managing Linux Processes

Section 8.10: Summary

Chapter 9: Controlling Services and Daemons

Section 9.1: Identifying Automatically Started System Processes

Section 9.2: Guided Exercise: Identifying Automatically Started System Processes

Section 9.3: Controlling System Services

Section 9.4: Guided Exercise: Controlling System Services

Section 9.5: Lab: Controlling Services and Daemons

Section 9.6: Summary

Chapter 10: Configuring and Securing SSH

Section 10.1: Accessing the Remote Command Line with SSH

Section 10.2: Guided Exercise: Accessing the Remote Command Line

Section 10.3: Configuring SSH Key-based Authentication

Section 10.4: Guided Exercise: Configuring SSH Key-based Authentication

Section 10.5: Customizing OpenSSH Service Configuration

Section 10.6: Guided Exercise: Customizing OpenSSH Service Configuration

Section 10.7: Lab: Configuring and Securing SSH

Section 10.8: Summary

Chapter 11: Analyzing and Storing Logs


Section 11.1: Describing System Log Architecture

Section 11.2: Quiz: Describing System Log Architecture

Section 11.3: Reviewing Syslog Files

Section 11.4: Guided Exercise: Reviewing Syslog Files

Section 11.5: Reviewing System Journal Entries

Section 11.6: Guided Exercise: Reviewing System Journal Entries

Section 11.7: Preserving the System Journal

Section 11.8: Guided Exercise: Preserving the System Journal

Section 11.9: Maintaining Accurate Time

Section 11.10: Guided Exercise: Maintaining Accurate Time

Section 11.11: Lab: Analyzing and Storing Logs

Section 11.12: Summary

Chapter 12: Managing Networking

Section 12.1: Describing Networking Concepts

Section 12.2: Quiz: Describing Networking Concepts

Section 12.3: Validating Network Configuration

Section 12.4: Guided Exercise: Validating Network Configuration

Section 12.5: Configuring Networking from the Command Line

Section 12.6: Guided Exercise: Configuring Networking from the Command Line

Section 12.7: Editing Network Configuration Files

Section 12.8: Guided Exercise: Editing Network Configuration Files

Section 12.9: Configuring Host Names and Name Resolution

Section 12.10: Guided Exercise: Configuring Host Names and Name Resolution

Section 12.11: Lab: Managing Networking

Section 12.12: Summary

Chapter 13: Archiving and Transferring Files

Section 13.1: Managing Compressed tar Archives

Section 13.2: Guided Exercise: Managing Compressed Tar Archives

Section 13.3: Transferring Files Between Systems Securely

Section 13.4: Guided Exercise: Transferring Files Between Systems Securely

Section 13.5: Synchronizing Files Between Systems Securely


Section 13.6: Guided Exercise: Synchronizing Files Between Systems Securely

Section 13.7: Lab: Archiving and Transferring Files

Section 13.8: Summary

Chapter 14: Installing and Updating Software Packages

Section 14.1: Registering Systems for Red Hat Support

Section 14.2: Quiz: Registering Systems for Red Hat Support

Section 14.3: Explaining and Investigating RPM Software Packages

Section 14.4: Guided Exercise: Explaining and Investigating RPM Software Packages

Section 14.5: Installing and Updating Software Packages with Yum

Section 14.6: Guided Exercise: Installing and Updating Software Packages with Yum

Section 14.7: Enabling Yum Software Repositories

Section 14.8: Guided Exercise: Enabling Yum Software Repositories

Section 14.9: Managing Package Module Streams

Section 14.10: Guided Exercise: Managing Package Module Streams

Section 14.11: Lab: Installing and Updating Software Packages

Section 14.12: Summary

Chapter 15: Accessing Linux File Systems

Section 15.1: Identifying File Systems and Devices

Section 15.2: Quiz: Identifying File Systems and Devices

Section 15.3: Mounting and Unmounting File Systems

Section 15.4: Guided Exercise: Mounting and Unmounting File Systems

Section 15.5: Locating Files on the System

Section 15.6: Guided Exercise: Locating Files on the System

Section 15.7: Lab: Accessing Linux File Systems

Section 15.8: Summary

Chapter 16: Analyzing Servers and Getting Support

Section 16.1: Analyzing and Managing Remote Servers

Section 16.2: Guided Exercise: Analyzing and Managing Remote Servers

Section 16.3: Getting Help From Red Hat Customer Portal

Section 16.4: Guided Exercise: Getting Help from Red Hat Customer Portal

Section 16.5: Detecting and Resolving Issues with Red Hat Insights
Section 16.6: Quiz: Detecting and Resolving Issues with Red Hat Insights

Section 16.7: Summary

Chapter 17: Comprehensive Review

Section 17.1: Comprehensive Review

Section 17.2: Lab: Managing Files from the Command Line

Section 17.3: Lab: Managing Users and Groups, Permissions and Processes

Section 17.4: Lab: Configuring and Managing a Server

Section 17.5: Lab: Managing Networks

Section 17.6: Lab: Mounting Filesystems and Finding Files

Red Hat System Administration II (RHEL8) – Objective

Chapter 1: Improving Command-line Productivity

Section 1.1: Writing Simple Bash Scripts

Section 1.2: Guided Exercise: Writing Simple Bash Scripts

Section 1.3: Running Commands More Efficiently Using Loops

Section 1.4: Guided Exercise: Running Commands More Efficiently Using Loops

Section 1.5: Matching Text in Command Output with Regular Expressions

Section 1.6: Guided Exercise: Matching Text in Command Output with Regular Expressions

Section 1.7: Lab: Improving Command-line Productivity

Section 1.8: Summary

Chapter 2: Scheduling Future Tasks

Section 2.1: Scheduling a Deferred User Job

Section 2.2: Guided Exercise: Scheduling a Deferred User Job

Section 2.3: Scheduling Recurring User Jobs

Section 2.4: Guided Exercise: Scheduling Recurring User Jobs

Section 2.5: Scheduling Recurring System Jobs

Section 2.6: Guided Exercise: Scheduling Recurring System Jobs

Section 2.7: Managing Temporary Files

Section 2.8: Guided Exercise: Managing Temporary Files

Section 2.9: Quiz: Scheduling Future Tasks

Section 2.10: Summary


Chapter 3: Tuning System Performance

Section 3.1: Adjusting Tuning Profiles

Section 3.2: Guided Exercise: Adjusting Tuning Profiles

Section 3.3: Influencing Process Scheduling

Section 3.4: Guided Exercise: Influencing Process Scheduling

Section 3.5: Lab: Tuning System Performance

Section 3.6: Summary

Chapter 4: Controlling Access to Files with ACLs

Section 4.1: Interpreting File ACLs

Section 4.2: Quiz: Interpreting File ACLs

Section 4.3: Securing Files with ACLs

Section 4.4: Guided Exercise: Securing Files with ACLs

Section 4.5: Lab: Controlling Access to Files with ACLs

Section 4.6: Summary

Chapter 5: Managing SELinux Security

Section 5.1: Changing the SELinux Enforcement Mode

Section 5.2: Guided Exercise: Changing the SELinux Enforcement Mode

Section 5.3: Controlling SELinux File Contexts

Section 5.4: Guided Exercise: Controlling SELinux File Contexts

Section 5.5: Adjusting SELinux Policy with Booleans

Section 5.6: Guided Exercise: Adjusting SELinux Policy with Booleans

Section 5.7: Investigating and Resolving SELinux Issues

Section 5.8: Guided Exercise: Investigating and Resolving SELinux Issues

Section 5.9: Lab: Managing SELinux Security

Section 5.10: Summary

Chapter 6: Managing Basic Storage

Section 6.1: Adding Partitions, File Systems, and Persistent Mounts

Section 6.2: Guided Exercise: Adding Partitions, File Systems, and Persistent Mounts

Section 6.3: Managing Swap Space

Section 6.4: Guided Exercise: Managing Swap Space

Section 6.5: Lab: Managing Basic Storage


Section 6.6: Summary

Chapter 7: Managing Logical Volumes

Section 7.1: Creating Logical Volumes

Section 7.2: Guided Exercise: Creating Logical Volumes

Section 7.3: Extending Logical Volumes

Section 7.4: Guided Exercise: Extending Logical Volumes

Section 7.5: Lab: Managing Logical Volumes

Section 7.6: Summary

Chapter 8: Implementing Advanced Storage Features

Section 8.1: Managing Layered Storage with Stratis

Section 8.2: Guided Exercise: Managing Layered Storage with Stratis

Section 8.3: Compressing and Deduplicating Storage with VDO

Section 8.4: Guided Exercise: Compressing and Deduplicating Storage with VDO

Section 8.5: Lab: Implementing Advanced Storage Features

Section 8.6: Summary

Chapter 9: Accessing Network-Attached Storage

Section 9.1: Mounting Network-Attached Storage with NFS

Section 9.2: Guided Exercise: Managing Network-Attached Storage with NFS

Section 9.3: Automounting Network-Attached Storage

Section 9.4: Guided Exercise: Automounting Network-Attached Storage

Section 9.5: Lab: Accessing Network-Attached Storage

Section 9.6: Summary

Chapter 10: Controlling the Boot Process

Section 10.1: Selecting the Boot Target

Section 10.2: Guided Exercise: Selecting the Boot Target

Section 10.3: Resetting the Root Password

Section 10.4: Guided Exercise: Resetting the Root Password

Section 10.5: Repairing File System Issues at Boot

Section 10.6: Guided Exercise: Repairing File System Issues at Boot

Section 10.7: Lab: Controlling the Boot Process

Section 10.8: Summary


Chapter 11: Managing Network Security

Section 11.1: Managing Server Firewalls

Section 11.2: Guided Exercise: Managing Server Firewalls

Section 11.3: Controlling SELinux Port Labeling

Section 11.4: Guided Exercise: Controlling SELinux Port Labeling

Section 11.5: Lab: Managing Network Security

Section 11.6: Summary

Chapter 12: Installing Red Hat Enterprise Linux

Section 12.1: Installing Red Hat Enterprise Linux

Section 12.2: Guided Exercise: Installing Red Hat Enterprise Linux

Section 12.3: Automating Installation with Kickstart

Section 12.4: Guided Exercise: Automating Installation with Kickstart

Section 12.5: Installing and Configuring Virtual Machines

Section 12.6: Quiz: Installing and Configuring Virtual Machines

Section 12.7: Lab: Installing Red Hat Enterprise Linux

Section 12.8: Summary

Chapter 13: Comprehensive Review

Section 13.1: Comprehensive Review

Section 13.2: Lab: Fixing Boot Issues and Maintaining Servers

Section 13.3: Lab: Configuring and Managing File Systems and Storage

Section 13.4: Lab: Configuring and Managing Server Security

You might also like