RHCSA Rapid Track Course

Linux Training Overview

This course presents the working environment of a RHEL 6 system. It introduces commonly required operations that can be performed by entering commands interactively in a command terminal, along with functions available in the K Desktop Environment (KDE) and Gnome. This course will concentrate on Red Hat Enterprise Linux (RHEL), version 6 (all update levels).

This course helps to prepare for the RHCSA examination.

Linux Training Prerequisites

This course is a concentrated preparation for the RHCSA examination.
Participants are assumed to be (Red Hat Enterprise) Linux system administrators working on production level configurations, and have used and demonstrated competencies in Linux fundamentals and entry-level administrative functions.

Linux Training Course duration

This course normally requires four (4) days, approximately 50% lecture and 50% lab time.

Linux Training Course Objectives

Each participant will be able to use RHEL 6 Bash Shell techniques and commands to maintain collections of files, create files using interactive editor utilities, create and execute basic command procedures, communicate with other users, and tailor the interactive environment to meet their needs. Basic administrative features to setup a functioning RHEL6 system will also be shown.

Linux Training Course outline

Command Line Process Management

Logging Into an RHEL 6 System
Bash Shell Syntax Rules
Documentation via man and info
Command Line Editing

Administer Remote Systems

RHEL 6 System Overview
Graphical User Environments (KDE, GNOME)
Using GUIs remotely
Customizing the Graphical Environments

Get Help in a Graphical Environment

RHEL 6 on-line documentation
Displaying local documentation in KDE / GNOME
Using GUIs remotely RHCSA Rapid Track Course

Installation and Managing Software

Installation types and methods
Installing the RHEL 6 operating system
Maintaining the system via patches
Managing system software (rpm)
Installing the RHEL 6 operating system via kickstart
Package management via yum (repositories)

Control the Boot Process

Components involved in the RHEL 6 boot
Grub loader stages and configuration
Default bootstrap
Boot to single-user mode
Linux startup methods, tools, and procedures
Understanding run levels and Upstart init
Adding procedures to the startup mechanisms
Shutdown methods and control

Managing User Accounts

UID and GID concepts
Creation of a user account
Security through password aging
Controlling access by groups
Connecting to an LDAP server

Managing Simple Partitions and File Systems

Commands to manipulate disks/filesystems
   partitioning disk surfaces with fdisk
   creating ext2/ext3/ext4 file systems (mkfs)
   manipulating file system structures
   verifying file system structures (fsck)
   making file systems available to software (mount)
   configuring swap space(s)
Encrypted File Systems RHCSA Rapid Track Course

Logical Volume Management

Commands to manipulate physical volumes
Commands to manipulate volume groups
Commands to manipulate logical volumes

Using File System Access Control Lists (ACLs)

Defining Access Control Lists (ACLs)
   directory (defaults)

Network Configuration and Troubleshooting

TCP/IP address selection
Host names and related files
Configuring network devices
Network testing with ping
Network utilities: telnet, rlogin, rcp, rsh, ssh

Deploy and Secure File System Services

Network File System (NFS)
Automounter (autofs)
Basic firewall setup (iptables)

Manage System Resources

Schedule repeating tasks with crontab
Controlling rsyslog

Tune and Maintain the Kernel

Kernel (boot time) options
Updating kernel modules
RHCSA Rapid Track Course

Managing SELinux

SELinux basics
Control via booleans
Understanding file contexts

Managing Virtual Machines

KVM concepts and requirements
Creating and controlling virtual machines

Wintrac Inc.
16523 SW McGwire Ct.
Beaverton OR 97007
Wintrac, Inc. All rights reserved.                                                                               Site Map   |   Terms of Use   |   Privacy Policy