Redhat Training

REDHAT LINUX ADMINISTRATION

The Red Hat Certified Engineer course will prepare you for the certification exam from Red Hat. This certification is intended to be earned by a current Red Hat Certified supervisor (RHCSA). This course will prepare you for the performance based certification exam by Red Hat that is intended to demonstrate your knowledge, skills, and experience as a senior supervisor that is liable for Red Hat Enterprise Linux systems.

To Download Course Details & Fee Structure


Details Course Content Of Red-hat Linux Administration Technologies

REDHAT LINUX ADMINISTRATION

  • Introduction to RHCE
  • System configuration and management Use Network Teaming or Bonding to Configure Aggregated Network Links Between Two Red Hat Enterprise Linux Systems or Interfaces
  • Configure IPv6 Addresses and Perform Basic IPv6 Troubleshooting
  • Route IP Traffic and Create Static Routes
  • Use Firewalld and Associated Mechanisms Such as Rich Rules, Zones and Custom Rules, to Implement Packet Filtering and Configure Network Address Translation (NAT) - Part I
  • Use Firewalld and Associated Mechanisms Such as Rich Rules, Zones and Custom Rules, to Implement Packet Filtering and Configure Network Address Translation (NAT) - Part II
  • Regression, Normal Equation

REDHAT LINUX ADMINISTRATION

  • Hands-on Labs are real live environments that put you in a real scenario to practice what you have learned without any other extra charge or account to manage. Configure IPv6 Addresses
  • Hands-on Labs are real live environments that put you in a real scenario to practice what you have learned without any other extra charge or account to manage. Route IP Traffic by Creating Static Routes
  • Hands-on Labs are real live environments that put you in a real scenario to practice what you have learned without any other extra charge or account to manage. Use Network Teaming or Bonding to Configure Aggregated Network Links Between Two Red Hat Enterprise Linux Systems
  • Hands-on Labs are real live environments that put you in a real scenario to practice what you have learned without any other extra charge or account to manage. Configure a System to Authenticate Using Kerberos
  • Hands-on Labs are real live environments that put you in a real scenario to practice what you have learned without any other extra charge or account to manage. Configure an iSCSI Target and Initiator
  • System configuration and management Network Services Section Overview

REDHAT LINUX ADMINISTRATION

  • Use Kerberos to Control Access to NFS Network Shares - Kerberos NFS Server and Client
  • Exercise: Provide Network Shares to Specific Clients - Server Setup
  • Hands-on Labs are real live environments that put you in a real scenario to practice what you have learned without any other extra charge or account to manage. Use Kerberos to Control Access to NFS Shares
  • SMTP Configure a System to Forward All Email to a Central Mail Server - Setup
  • Hands-on Labs are real live environments that put you in a real scenario to practice what you have learned without any other extra charge or account to manage. Configure a System to Forward All Email to a Central Mail Server
  • Exercise: Configure a System to Forward All Email to a Central Mail Server
  • SSH Configure Key-Based Authentication
  • Configure Additional Options Described in Documentation
  • Exercise: Configure Key-Based Authentication
  • NTP Synchronize Time Using Other NTP Peers - Set Up Local Time Server
  • NTP Synchronize Time Using Other NTP Peers - Set Up Local Time Server
  • Synchronize Time Using Other NTP Peers - Peer with New Time Server
  • Database Services Install and Configure MariaDB
  • Install and Configure Local and Remote MariaDB Clients
  • Create a Simple Database Schema
  • Perform Simple SQL Queries Against a Database
  • Perform Simple SQL Queries Against a Database
  • Backup and Restore a Database - Backups
  • Exercise: Install and Configure MariaDB

REDHAT LINUX ADMINISTRATION

  • Use /proc/sys and sysctl to Modify and Set Kernel Runtime Parameters
  • Configure a System to Authenticate Using Kerberos - KDC Server Setup
  • Configure a System to Authenticate Using Kerberos - Client Setup
  • Configure a System as Either an iSCSI Target or Initiator That Persistently Mounts an iSCSI Target - Target Setup
  • Configure a System as Either an iSCSI Target or Initiator That Persistently Mounts an iSCSI Target - Initiator Setup
  • Produce and Deliver Reports on System Utilization (Processor, Memory, Disk, and Network)
  • Exercise: Produce and Deliver Reports on System Utilization

REDHAT LINUX ADMINISTRATION

  • Install the Packages Needed to Provide the Service
  • Configure SELinux to Support the Service
  • Use SELinux Port Labeling to Allow Services to Use Non-Standard Ports
  • Configure the Service to Start When the System is Booted
  • Configure the Service for Basic Operation
  • Configure Host-Based and User-Based Security for the Service
  • Exercise: Configure and Use SELinux to Support Services
  • Exercise: Configure a Service to Start When the System is Booted
  • HTTP/HTTPS Install and Configure Apache

REDHAT LINUX ADMINISTRATION

  • The Apache Configuration File - A Walk Through
  • Configure Private Directories
  • Configure Group Managed Content
  • Configure a Virtual Host
  • Deploy a basic CGI application
  • Configure TLS Security - Generating Key Files, CSRs and Self Signed Certificates
  • Configure TLS security - Configuring the Virtual Host
  • Exercise: Install and Configure Apache
  • Exercise: Configure a Virtual Host
  • DNS Configure a Caching-Only Name Server
  • Troubleshoot DNS Client Issues
  • NFS Provide Network Shares to Specific Clients - Server Installation and Configuration
  • Provide Network Shares to Specific Clients - Client Installation and Configuration
  • Provide Network Shares Suitable for Group Collaboration
  • Use Kerberos to Control Access to NFS Network Shares - Quick NFS Setup