RH134: Red Hat System Administration – II (RHEL8)

Overview
Red Hat System Administration II (RH134) is designed as the second part of the Red Hat Certified System Administrator (RHCSA) training track for IT professionals who have taken Red Hat System Administration I (RH124). The course goes deeper into core Linux system administration skills, including storage configuration, security feature management, task control, and installation and deployment of Red Hat Enterprise Linux.

This course is based on Red Hat Enterprise Linux 8.2.

  • Install Red Hat Enterprise Linux using scalable methods
  • Access security files, file systems, and networks
  • Execute shell scripting and automation techniques
  • Manage storage devices, logical volumes, and file systems
  • Manage security and system access
  • Control the boot process and system services
  • Running containers

Pre-Requisites
The participant should have undergone RH124 Red Hat System Administration I training.

Target Audience
This course is singularly designed for students who have completed Red Hat System Administration I (RH124). The students who have not taken a previous Red Hat course are encouraged to take either System Administration I if they are new to Linux, or the RHCSA Fast Track course (RH200) if they are experienced with enterprise Linux administration.

Duration: 4 days (Full-time)

Training Fee: Rs.10,000/- (Plus GST)

10,000.00Read more



Course Outline

Improve command line productivity
Run commands more efficiently by using advanced features of the bash shell, shell scripts, and various utilities provided by Red Hat Enterprise Linux.

Schedule future tasks
Schedule commands to run in the future, either one time or on a repeating schedule.

Tune system performance
Improve system performance by setting tuning parameters and adjusting scheduling priority of processes.

Control access to files with ACLs
Interpret and set access control lists (ACLs) on files to handle situations requiring complex user and group access permissions.

Manage SELinux security
Protect and manage the security of a server by using SELinux.

Maintain basic storage
Create and manage storage devices, partitions, file systems, and swap spaces from the command line.

Manage logical volumes
Create and manage logical volumes containing file systems and swap spaces from the command line.

Implement advanced storage features
Manage storage using the Stratis local storage management system and use VDO volumes to optimize storage space in use.

Access network-attached storage
Use the NFS protocol to administer network-attached storage.

Control the boot process
Manage the boot process to control services offered and to troubleshoot and repair problems.

Manage network security
Control network connections to services using the system firewall and SELinux rules.

Install Red Hat Enterprise Linux
Install Red Hat Enterprise Linux on servers and virtual machines.

Run Containers (Additional topic included from October 2020)
Obtain, run, and manage simple, lightweight services as containers on a single Red Hat Enterprise Linux server.

Print Friendly, PDF & Email

” width=”20″ height=”20″>