Course: Red Hat Certified System Administrator - RHCSA (exam EX200)

$499.00
$603.79 incl. vat

duration: 32 hours |

Language: English (US) |

access duration: 180 days |

In Onbeperkt Leren

In this Red Hat training course you will learn to implementate, manage and secure a Red Hat Enterprise Linux 7 system. In the course you will learn as a full-time interprise Linux adminstrator the knowledge and skills in the field of systems management in Red Hat.

Among subjects that covered are storage management, serer management, virtual machines, security and far more.

Result

After completing this course you can implement, manage and secure a Red Hat Enterprise Linux 7 environment. You are also prepared for the Red Hat EX200 exam.

Prerequisites

There is no specific knowledge required. We recommend basic knowledge of system management. We recommend knowledge of a Linux system.

Target audience

System Administrator, Helpdesk Operator

Red Hat Certified System Administrator - RHCSA (exam EX200)

32 hours

Red Hat Certified System Administrator: The Environment

start the course use Gnome to run applications, manage virtual workspaces, and use window control buttons configure Gnome menus, panels, and desktop icons, themes, and colors for a better user experience access online help with a web browser or built-in help through Gnome explore the file system using the Gnome file manager copy, move, delete, and rename files and directories using the Gnome file manager create and edit text files from the desktop environment using the Gnome editor login, logoff, lock, and unlock a Gnome session as well as power up and down a system use the two default Gnome mail clients and configure basic settings to send and receive e-mail work with the network-manager to check the network configuration and explore networks from the File Manager describe the roles and differences between Xwindows and the Gnome desktop environment configure system and security settings from the Gnome interface switch users on a multiuser system and run multiple desktops for different users describe a shell, the purpose for shells, and list some of the shells available open, close, set fonts, set colors, resize, and run a command from the Bourne Again Shell (BASH) using autocomplete, and using history with the hist command and arrow keys list, copy, move, and delete files list, create, move, change, and delete directories; and use shortcuts to move around the file system execute GUI applications from the command line, run them in the background, and see diagnostic or debug information in the shell use man and info to get help, and identify or locate help in /usr/share/doc use common commands like less, cat, more, and diff to view and compare file contents describe how relative and absolute paths are used and how shortcuts like ../ and ~/ make directory traversal easier create aliases for commands and make links to files or directories manipulate the BASH prompt and describe how the env and export features can be used use the shell tools echo, cat, and who to create and edit text files explore the Gnome User Interface and run commands from the BASH Shell

Red Hat Certified System Administrator: The Command Line

start the course use input and output redirection to stdin and stdout to manage output from shell commands use pipes to chain one command to another to alter the output use globbing to select files based on matching filename patterns switch users and shells within a Terminal window; in particular to become the root user to perform administrative tasks switch to and back from TTY consoles in order to execute shell commands use the find command to locate files based on their name or other properties perform actions on files that are returned from a find command identify the path and filename for a command or locate files that have been indexed work with vim to open, do basic edits, and save a text file use features of vim to search text, replace text, and add, remove, or delete lines perform basic file operations and editing using the emacs text editor use a shell text editor to create or edit a text file work with sed to alter the contents of a text file identify a BASH script file and the header specifying the interpreter used for the script create a simple BASH script that can chain multiple commands together to perform an action execute, pause, and run a script in the background and then bring it to the foreground view the shell environment variables and be able to set a shell variable within a script recognize an archived file and the tools necessary to retrieve the contents use the gzip and gunzip commands to compress or decompress a file use bzip2 to compress or decompress a file use the tar command to create, extract, compress, or list the contents of an archive use the star command to create, extract, compress, or list the contents of an archive that supports extended ACLs use gzip and bzip2 with tar directory to compress and decompress in a stream use additional, but not as often used in Linux, compression and decompression tools use scripts to automate the management and archiving of files and directories

Red Hat Certified System Administrator: Administration and Permissions

start the course run the Gnome package manager to view installed and find software install software from the package manager update the current software manually or automatically using the package manager choose appropriate update times, schedules, and mode to update the RHEL 7 system use yum to list, find, and install software packages from the shell update the system software from the shell remove, reinstall, or replace a software package add, remove, or set the software repositories for yum and the Gnome package manager configure a local repository and only allow software packages and updates that have been approved describe how users and groups work and how they are connected add, edit, modify, and delete a user using the Gnome User Manager application change your password through the Gnome interface or from the shell describe the components of the /etc/password file and the purpose of the /etc/shadow file change any users password including the root user add, delete, and edit a user from a shell including how to set the user properties, shell, and home directory modify user properties directly in the /etc/passwd file to fix user problems apply user password ageing and other policies to user accounts add, modify and delete groups add a user to a group or groups modify a users default group describe the basic file permissions for users and groups and how they relate to file ownership identify POSIX file and ownership permissions on files and directories change a files owner and group and set file and group permissions change a directories owner, group and permissions add and edit users, groups and packages as well as configure user permissions on files

Red Hat Certified System Administrator: Scripting and Scheduling

start the course identify and understand the basic syntax of a regular expression use grep to find patterns in a file based on simple patterns or regular expressions use advanced grep features like recursively finding matching files and ignoring case sensitivity use grep with I/O redirection and pipes to create lists use grep to locate content within a text file get and set discretionary and mandatory Access Control Lists add, edit, and view quotas create a directory that can be shared by multiple users in a common group use read to get input from the user in a BASH script use the if statement and the basic looping construct for use the while and until looping constructs use bash test operators to check for conditions describe the order of expansion when used a script set an exit status and use it from the Shell describe the different job schedulers and how they differ describe the configuration of a crontab file and the different sections for a cron job create a cron job edit and pause cron jobs as well as set jobs for users and root identify the at parameters and commands used for managing jobs schedule a job using at alter, delete, and view at jobs describe a systemD timer unit and the options schedule a systemD timer task convert a cron job to a systemD timer task create a script that will use grep to find files with certain contain and schedule this job to run each day at 2:05 am

Red Hat Certified System Administrator: Processes, Networking, and Logging

start the course list and identify running processes recognize common running processes monitor processes and their resource utilization start and stop processes set or change the priority for a process troubleshoot or identify problem processes start and stop a network service configure a service to start or not start at boot use SystemD to start services work with SystemD to manage running services use SystemD to manage the system describe basic networking terminology and interfaces on Linux identify network devices and their configuration use the Gnome network manager to configure a network device change the hostname, DNS, and other network settings for the host; including deactivating and activing a network device configure a network device entirely from the shell configure the system to use a network time source configure Linux systems with common network scenarios list the location of log files and the purpose of the common logs view and analyze log files and interpret basic values from other journal sources review SystemD journal logs configure SystemD journals to forward system messages to traditional system logging tools store and archive logs configure what is logged to system logs modify the system log settings and retention policies use renice to change a processes priority, change a network adaptors IP Address and check the logs for any unauthorized access attempts

Red Hat Certified System Administrator: Advanced Networking

start the course work with network services through SystemD Services configure a basic bind service configure a basic dhcpd service configure a basic ntpd service configure a system to use Precision Time Protocol configure the logging server to store logs sent from external servers configure a basic smbd service use Samba to share a directory with Windows clients configure a basic sshd service configure a basic web service configure a basic telnet service configure a basic ftp service configure a basic squid proxy service configure a basic mail server use the Security Level Configuration Tool to manage a basic firewall describe the sections of the firewall and the basics of how the firewall rules are configured add and delete rules to an iptable configured firewall save and restore iptable rulesets configure the system to use a set of firewall rules on boot from the shell add a rule to allow a network service port through the firewall use the advanced features of the firewall manager add a limit to the firewall for certain types of traffic start a network service add a rule to the firewall to allow external access to the service

Red Hat Certified System Administrator: Remote Connections and Access

start the course describe the various remote access technologies that are available on Linux use telnet to connect to remote hosts use VNC to connect, or be the host of, a remote connection use ssh to connect to a remote host use scp to transfer a file to and from a host work with ssh tunneling to secure vnc or xdmcp use ssh keys to authenticate rather than user name and password describe the components of the Network File System install, setup and configure NFS recognize the differences in the configuration for running NFS securely mount an external shared NFS partition to the local system add and configure a local NFS share configure an exported share to work on reboot enable and support pNFS on the server mount and unmount remote SMB, or Samba, shares use autofs to mount shares automatically identify the files and setting that must be changed to support an external directory service configure a system to use an LDAP based directory service login to the server using a user account from the LDAP directory service configure and use permissions and settings for the LDAP user on the server configure a system to use MS Active Directory login to the server using a MS Active Directory user account configure MS AD permissions for the user on the server use a Directory Service configured client to mount a remote NFS share that you configure on a remote host

Red Hat Certified System Administrator: File Systems and Device Management

start the course describe the various supported file systems identify the file systems of mounted and external drives mount and unmount various file systems configure the system to mount a file system at boot use an encrypted file system mount an encrypted file system at boot and using a fully encrypted file system control the automatic mounting of file systems when devices are plugged in and safely unmount file systems add new partitions or additional swap space non-destructively create a file system on a physical disk use tools to create, delete, list and manage MBR based partitions resize a MBR based partition change the label of a partition mount and unmount iSCSI Network Area Storage use tools to create, delete, and list GPT based partitions using and compressing swap partitions or files identify and describe LVM configuration for Volumes use basic LVM commands to create and remove volumes manage free space in a storage pool and allocate space as required assign logical and physical volumes to a volume group use LVM tiered storage to use faster SSDs with HDDs to create fast "hybrid" storage create a snapshot of a volume backup and restore volumes use shell commands to manage LVM storage create and configure a basic RAID 0, 1, and 5 volume resize a RAID volume create an XFS LVM Filesystem and then mount the partition so it will be available even after rebooting

Red Hat Certified System Administrator: Boot Process and Installation

start the course describe the basic boot process and system components involved configure the boot loader alter the runlevel of the system identify, configure, and boot from GPT or MBR change the boot target with systems using SystemD alter the boot process to gain access to fix problems or diagnose issues create boot targets, boot states, and control parallel daemon instantiation with SystemD describe Red Hat Enterprise Linux (RHEL) 7 hardware requirements describe and be able to select the appropriate installation method perform the initial install of RHEL 7 onto a physical system using the graphical installer complete the install of RHEL 7 onto a physical system using the graphical installer perform a minimal install using the text mode installer complete a minimal install using the text mode installer describe swap space requirements and how to manage swap space during installation recognize issues that can occur with UEFI and some setting that can allow the installation still configure kernel setting and limits update or modify a kernel to ensure a bootable system list, add, remove, and configure kernel modules troubleshoot basic boot failures after an installation troubleshoot and configure the GRUB boot loader fix boot partition issues fix mount points that no longer exist use modprobe to blacklist modules alter kernel settings to solve common system issues list the kernel modules, change the runlevel target, and add a second boot option to the grub boot loader in RHEL 7

Red Hat Certified System Administrator: Introduction to Virtualization

start the course describe the built-in virtualization tools and programs in RHEL 7 distinguish between the different virtualization tools used to run guests on RHEL 7 describe and use RHEL 7 as a guest running on a Host install RHEL 7 as a guest launch a RHEL 7 guest from the host modify the running RHEL 7 guest to perform well under a host configure keyboard support use tools to detect problems in guests and report them to the host use sVirt to protect guests configure and optimize RHEL 7 to be a host for guests configure settings for hosting guests create and manage virtual machines access a virtual machine's console from the host start, stop, and control guests configure the system to start virtual machines on boot obtain information about a guest throttle I/O for a guest and manage guest resource allocations use kickstart to create an automation script for automated installs investigate booting or installation issues using dracut configure Kickstart to automatically connect to a Directory Service use a kickstart script to do an installation use a kickstart script to install RHEL 7 as a guest use SystemTap to investigate and monitor the activities of the operating system kernel use built-in tools to generate bug and crash reports for diagnosis or sending to Red Hat use kpatch to do dynamic patches to the kernel use RHEL 7 as a Host for VMs and as a Client running on a VM

Red Hat Certified System Administrator: SELinux and Troubleshooting

start the course identify and recognize the components and purpose of SELinux configure and choose the applicable SELinux Mode configure SELinux settings identify and recognize the components and purpose of SELinux User contexts use and apply a SELinux Process context use restorecon to restore file security contexts identify role-based access controls (RBAC) in SELinux identify and choose SELinux Policies configure and control SELinux Policies add a new policy rule to be enforced identify and troubleshoot a reported policy violation use SELinux to secure a Network Service troubleshoot common memory issues troubleshoot CPU or Memory intensive processes identify and diagnose file permission issues troubleshoot common file permission security issues troubleshoot common network issues identify locked files or files used by a process troubleshoot and repair the XFS file system describe the basic tools for repairing a variety of file systems debug the XFS file system troubleshoot a drive that has failed in either a hot-swap or raid configuration troubleshoot using the Red Hat Rescue Environment use SELinux to protect a network service and find the processes using the most memory or CPU resources

We offer several optional training products to enhance your learning experience. If you are planning to use our training course in preperation for an official exam then whe highly recommend using these optional training products to ensure an optimal learning experience. Sometimes there is only a practice exam or/and practice lab available.

Optional practice exam (trial exam)

To supplement this training course you may add a special practice exam. This practice exam comprises a number of trial exams which are very similar to the real exam, both in terms of form and content. This is the ultimate way to test whether you are ready for the exam. 

Optional practice lab

To supplement this training course you may add a special practice lab. You perform the tasks on real hardware and/or software applicable to your Lab. The labs are fully hosted in our cloud. The only thing you need to use our practice labs is a web browser. In the LiveLab environment you will find exercises which you can start immediatelyThe lab enviromentconsist of complete networks containing for example, clients, servers,etc. This is the ultimate way to gain extensive hands-on experience. 

WHY_ICTTRAININGEN

Via ons opleidingsconcept bespaar je tot 80% op trainingen

Start met leren wanneer je wilt. Je bepaalt zelf het gewenste tempo

Spar met medecursisten en profileer je als autoriteit in je vakgebied.

Ontvang na succesvolle afronding van je cursus het officiële certificaat van Icttrainingen.nl

Krijg inzicht in uitgebreide voortgangsinformatie van jezelf of je medewerkers

Kennis opdoen met interactieve e-learning en uitgebreide praktijkopdrachten door gecertificeerde docenten

Orderproces

Once we have processed your order and payment, we will give you access to your courses. If you still have any questions about our ordering process, please refer to the button below.

frequently asked quesions

What is included?

Duration 32 hours
Language English (US)
Certificate of participation Yes
Online access 180 days
Monitor Progress Yes
Award Winning E-learning Yes
Examination possibleYes
Mobile ready Yes

Also included in world's #1 eLearning portal

Sharing knowledge Unlimited access to our IT professionals community
Study advice Our consultants are here for you to advice about your study career and options
Study materials Certified teachers with in depth knowledge about the subject.
Platform Access to our platform.
Service World's best service

Platform

Na bestelling van je training krijg je toegang tot ons innovatieve leerplatform. Hier vind je al je gekochte (of gevolgde) trainingen, kan je eventueel cursisten aanmaken en krijg je toegang tot uitgebreide voortgangsinformatie.

Life Long Learning

Follow multiple courses? Read more about our Life Long Learning concept

read more

Contact us

Need training advise? Contact us!


contact