Description

This course curriculum follows the RHCSA  exam outline:  12+ hours Training Videos for all Exam ObjectivesIntroductionEssential ToolsAccess a shell prompt and issue commandsUse Input-Output RedirectionUse Input/Output Redirection – Part 2Use Grep and Regular Expressions to Analyze TextAccess Remote System Using SSHLog in and Switch Users in MultiUser TargetsArchive, Compress, Unpack and Uncompress Files Using tar, star, gzip and bzip2Archive, Compress, Unpack and Uncompress Files Using tar, star, gzip and bzip2 – Part2Create and Edit Text FilesCreate, Delete, Copy and Move Files and DirectoriesCreate Hard and Soft LinksList, Set and Change Standard UGO/RWX Permissionsm.List, Set and Change Standard UGO/RWX Permissions – Part 2List, Set and Change Standard UGO/RWX Permissions umaskLocate, Read and Use System Documentation with man, info and usr/share/docFinding Files with Locate and FindOperate Running systemsBoot,Reboot and Shutdown a SystemBoot system into different targetsInterrupt the Boot Process to Gain Access to the SystemAdjust Process Priority and Kill Processes-Part1Adjust Process Priority and Kill Processes-Part2Adjust Process Priority and Kill Processes-Part3Adjust Process Priority and Kill Processes-Part4Locate and Interpret System Log Files and JournalsStart, Stop and Check the Status of Network Services Securely Transfer Files Between SystemsConfigure Local StorageList, Create and Delete Partitions on MBR and GPT DisksUsing LVMConfigure Systems to Mount File Systems at Boot by UUID or LabelAdd New Partitions and Logical Volumes and Swap to a System Non DestructivelyCreate and Configure File SystemsCreate, Mount, Unmount and Use VFAT, EXT4 and XFS File SystemsMount and Unmount CIFS and NFS Network File SystemsExtend Existing Logical VolumesCreate and Configure Set-GID Directories for CollaborationCreate and Manage Access Control Lists (ACLs) Part 01Create and Manage Access Control Lists (ACLs) Part 02 Diagnose and Correct File Permission ProblemsDeploy, Configure and Maintain SystemsConfigure Networking and Hostname Resolution Statically or Dynamically :TroublesNetworking and Hostname Resolution Statically or Dynamically : Network ManagerNetwork /Hostname Resolution Statically or Dynamically : Hostname ConfigurationSchedule Tasks Using at and cronSchedule Tasks Using at and cron Part 2Start and Stop Services and Configure Services to Start Automatically at BootConfigure Systems to Boot into a Specific Target AutomaticallyInstall Red Hat Enterprise Linux Automatically Using KickstartConfigure a Physical Machine to Host Virtual GuestsConfigure a System to Use Time ServicesInstall and Update Software Packages from Red Hat Network, YUM REPOInstall and Update Software Packages from Red Hat Network, RPM REPOManaging RepositoriesConfiguring a Local RepositoryConfiguring a Local Repository Configure the GPG KeyUpdate the Kernel Package Appropriately to Ensure a Bootable SystemModifying the System BootloaderManage Users and GroupsCreate, Delete & Modify Local User AccountsChange Passwords & Adjust Password Aging for specific usersCreate, Delete, and Modify Local Groups and Group MembershipsUsing set-GID on DirectoriesManage SecurityConfigure Firewall Settings Using Available Firewall UtilitiesConfigure Firewall Settings Using Available Firewall Utilities – Part2Configure Key-Based Authentication for SSHIntroduction to SELinuxSet Enforcing and Permissive Modes for SELinuxList and Identify SELinux Files and Process ContextsRestore Default File ContextsUse Boolean Settings to Modify System SELinux SettingsUDiagnose and Address Routine SELinux Policy Violations