Red Hat System Administration II

Linux Training Overview

This course will present the commands and methods needed to setup and manage a RHEL 8 system. The course will also use a problem solving approach in the lab exercises to teach system administrators advanced topics, for long-term management of the system.

This course is the second preparation course for the RHCSA 8 certification examination.

Systems: Red Hat Enterprise Linux Version 78(all update levels)

Linux Training Prerequisites

It is assumed that the participant has successfully completed the Red Hat System Administration I course, or has equivalent system administration experience on a RHEL 7 or 8 server.

Linux Training Course duration

This course normally requires five (5) days, approximately 50% lecture, and 50% hands-on commands and lab exercises. If this class is being used as a preparation for the RHCSA 8 examination, a practice exam will be part of the afternoon session on the fifth day.

Linux Training Course Objectives

On completion of this course, a systems administrator should be able to install, update, and boot the RHEL 8 operating system; set up user accounts and directories; prepare queues for use; perform backups for integrity and performance reasons; monitor the system for performance and do basic setup of network software and capabilities.

Linux Training Course outline

Improve Command Line Productivity
  • vim editor
  • invoking vim
  • .vimrc file
  • key vim features
  • advanced vim features
  • gvim
  • using command aliases and shell scripts
Using Regular Expressions with grep
  • regular expressions
Schedule Future Tasks
  • submitting a batch job with at
  • batch job logging with at
  • submitting a batch job with crontab
  • crontab file entry layout
  • uses of crontab entries
  • system level periodic processing via crond
  • periodic processing via a systemd timer
Control Access to Files with ACLs
  • special file attributes (SUID, SGID, STICKY)
  • special directory attributes (SGID, STICKY)
  • Access Control Lists (ACLs)
  • default directory access control lists (dACLs)
Install Red Hat Enterprise Linux 8 (with kickstart)
  • building a kickstart File
  • initiating Installation via a kickstart File
  • upgrading Red Hat Enterprise Linux 8
  • KVM virtual machine requirements
  • KVM virtual machine creation
Control the Boot Process
  • RHEL 8 system initialization sequence
  • Grand Unified Boot Loader (GRUB 2)
  • Grand Unified Boot Loader (GRUB 2) - components
  • Grand Unified Boot Loader (GRUB 2) - variables
  • Grand Unified Boot Loader (GRUB 2) - menuentries
  • RHEL 8 server single user mode
  • RHEL reset forgotten root password
  • kernel boot parameters
  • shutdown
  • install rescue mode
Maintain Basic Storage
  • disk device and partition operations
  • disk device information
  • MBR partition table concepts
  • GPT partition table concepts
  • Red Hat Enterprise Linux 8 system (boot) disk
  • MBR partition operations
  • GPT partition operations
  • file system operations
  • Red Hat Enterprise Linux 8 ext* file system layout
  • ext4 filesystem
  • superblock backup areas
  • Red Hat Enterprise Linux 8 xfs file system layout
  • xfs filesystem
  • unmounting filesystems
  • swapping and paging spaces
  • encrypted filesystems
  • changes to /tmp
Manage Logical Volumes
  • logical volume management concepts
  • logical volume management utilities
  • using the logical volume manager
  • physical volumes
  • volume groups
  • logical volumes
  • logical volume mirroring
  • logical volume backup
  • using logical volumes as swap space
Implement Advanced Storage Features
  • Stratis volume management concepts
  • using Stratis as a volume managing filesystem
  • Stratis volume management commands
  • using Stratis
  • VDO volume management concepts
  • using VDO as for volume compression
  • VDO volume management commands
  • using VDO
Manage Network Security
  • service specific access control
  • firewalld components
  • firewall interface - firewall-cmd
  • firewall interface - cockpit
  • iptables firewall
Access Network-Attached Storage
  • Network File System concepts
  • Network File System configuration
  • setting up the Network File System
  • starting up the Network File System
  • using the Network File System
  • Automounter - direct / indirect maps
Manage SELinux Security
  • SELinux concepts
  • SELinux files and utilities
Tune System Performance
  • overview of performance management
  • utilities for performance monitoring
  • changing system and kernel parameters
  • using tuned to define performance profiles

Wintrac Inc.
16523 SW McGwire Ct.
Beaverton OR 97007
Wintrac, Inc. All rights reserved.                                                                               Site Map   |   Terms of Use   |   Privacy Policy