This highly practical instructor led Administering Red Hat Linux 8 – Part 2 training course is designed to give delegates practical experience in the administration of a Red Hat Enterprise Linux (RHEL) system. With a strong emphasis on practical hands on training, this course will teach further essential administrative tasks required to successfully administer a Red Hat Linux system.
Targeted to closely follow the official Red Hat certification curriculum, this course together with the Administering Red Hat Linux 8 – Part 1 course, will enable the delegate to work towards achieving the Red Hat Certified System Administrator (RHCSA) qualification – which is available until May 2020.
In addition, by attending the Administering Red Hat Linux 8 System Administration – Part 1 & Part 2 courses together with the Administering Red Hat Linux 8 – Part 3 : Linux Automation course, these three courses will enable the attendee to work towards achieving the Red Hat Certified Engineer (RHCE).
Exercises and examples are used throughout the course to give practical hands-on experience with the techniques covered.
On completion of this Administering Red Hat Linux 8 – Part 2 course the delegate will have gained practical experience of the Linux commands, the GUI’s and posses the technical knowledge required to perform System Administration tasks.
This Administering Red Hat Linux 8 – Part 2 course is suitable for anyone who has acquired basic administration skills from attending the Administering Red Hat Linux 8 – Part 1 course. This will include novice System Administrators, Network administrators, Programmers and other technical IT staff who need to acquire knowledge of the key administration tasks required to administer a Red Hat Linux system.
This course will teach many of the necessary skills to enable the delegate to work towards achieving the Red Hat Certified System Administrator (RHCSA) certification followed by the Red Hat Certified Engineer (RHCE) certification. The course assumes knowledge of the Red Hat Linux operating system to the level covered in the Administering Red Hat Linux 8 – Part 1 course.
The delegate will learn and acquire skills as follows:
Automate a system install using Kickstart
Search files and output using regular expressions
Use switch user command
Use vim to edit text files
Introduction to Cockpit Web based Management
Scheduling tasks to run automatically at predefined times
Changing the priorities at which process run
Understand and configure Access Control Lists (ACL’s)
Understand and manage SELinux context types etc
Be able to connect to a central LDAP for checking identities
Use the command line to create Partitions, Volume Groups and Logical Volumes and Stratis
Extend and decrease Volume Groups and Logical Volumes using the command line
Extend file systems
Introduction to Virtual Data Optimiser
Access a Network File System (NFS) Server
Be capable of mounting SMB (cifs) file systems
Managing groups, extended file permissions
Deploy Containers using Red Hat’s new tools Podman and Buildah (these replace Docker)
Configure a basic firewall
The course assumes knowledge of the Red Hat Linux operating system to the level covered in the Administering Red Hat Linux 8 – Part 1 course.
Administering Red Hat Linux 8 – Part 1
This training course will teach some of the necessary skills to enable the delegate to work towards achieving the official Red Hat Certified System Administrator (RHCSA) and the Red Hat Certified Engineer (RHCE) certification routes.
This course in conjunction with the Administering Red Hat Linux 8 – Part 1 course leads to RHCSA certification and together with the Administering Red Hat Linux 8 – Part 3 : Linux Automation course leads to RHCE certification.
Before taking any exam, ensure you have the recommended experience. The Red Hat website lists all exam requirements and these are updated regularly.
Exams are not included as part of the course.
Administration and Course Materials
Course Structure and Agenda
Delegate and Trainer Introductions
Introduction to text file editing using vi/vim
Copying and moving text
Search and replace features
Reading and writing from file
Searching for text in vim
Using grep to search the contents of text files using regular expressions
Introduction to using ‘sed’ using regular expressions.
Use of nice and renice commands
Foreground and background processing
How Kickstart works
Sections within a Kickstart configuration file
Pre and Post Kickstart processing
Creating a Kickstart file
Creating the Linux Install Server
Differing ways of starting a Kickstart installation
Access Control List (ACL’s)
Authentication policies and User Private Groups
Password management using passwd, chage etc
Managing user profile files
Extended file permissions including suid,sgid
Switching to another user
Connecting to a centralized administration server
Creating Volume Groups and Logical Volumes
Creating File Systems
Stratis Layered Storage
Extending Volumes and LVM file systems
LUKS encrypted partitions
Creating and Managing Swap space
Extending Stratis Storage
Limiting network access through a firewall
The firewalld program
Basic configuration using the GUI interface firewall-config
Management of SELinux
Easy configuration and customisation of SELinux
semanage, getsebool, setsebool and chcon commands
SELinux log files
Configuring client access to an Network Filesystem Server (NFS)
Providing CIFS access (SMB)
Configure access from a client to a DNS server
The Yellow Dog Update, Modifier Tool (YUM)
Creating YUM and dnf repositories
Using ‘at’ to manage one-off jobs
Using the cron system
System crontab files
Monitoring cron access
Controlling access to the ‘cron’ and ‘at’ facilities
The Apache Web Servers
Apache server configuration files
Apache Configuration Directives
Basic Server Configuration
HTTP and SELinux
The FTP Service using vsftpd
Anonymous FTP Access
Loading and removing modules
Updating the Kernel package
Using kernel arguments
Overview of VDO
Requirements and definitions
Creating VDO volumes
Increasing Physical and Logical Volume sizes
What is a Linux Container
What are the advantages of Containers
Why is Red Hat’s Buildah and Podman replacing Docker
Building a Container using Buildah
Running Containers with Podman
Understanding the boot process
The Rescue Environment
Booting into Single User Mode
Recovery from lost root password