Course Overview
The increasingly critical world of IT security required more realistic and reliable measure of technical competency, so that organizations can identify those qualified to implement security solutions. To this end, Red Hat now offers, Red Hat Certified Architect (RHCA), a new security certification that proves skills in using Red Hat Enterprise Linux, SELinux and Red Hat Directory to meet the security requirements of today’s enterprise environment.
Red Hat Certified Architect (RHCA) is the RHCA is the most senior system administration credential and is designed for technical leaders working in demanding enterprise environments.. RHCA certification incorporates the skills and knowledge of a Red Hat Certified Datacenter Specialist (RHCDS) plus advanced networking services security, system monitoring, and performance tuning.
Audience Profile:
This LINUX Fundamentals training course is designed for individuals that require a developed knowledge of LINUX, including administrators, developers, and architects.
-This course is designed for experienced Linux system administrators who want to broaden their ability to administer Linux systems at an enterprise level.
Course Outcome:
* Introduction to the command line
* Managing physical storage
* Learning how to install and configure software components and services
* Establishing network connections and firewall access
* Monitoring and managing processes
* Managing and securing files
* Administrating users and groups
* Accessing Linux file systems
* Installing and using virtualized systems
* Reviewing the system log files and journal
* Installation using Kick start
* Managing file systems and logical volumes
* Managing scheduled jobs
* Accessing network file systems
* Managing SELinux
* Controlling firewalling
* Troubleshooting
*Network port security and link aggregation
*iSCSI initiator and target configuration
* DNS troubleshooting and caching name server
Course Content
ADMIN I
Get started with Red Hat Enterprise Linux
Describe and define open source, Linux distributions, and Red Hat Enterprise Linux.
Access the command line
Log into a Linux system and run simple commands using the shell.
Manage files from the command line
Copy, move, create, delete, and organize files while working from the bash shell.
Get help in Red Hat Enterprise Linux
Resolve problems by using local help systems.
Create, view, and edit text files
Manage text files from command output or in a text editor.
Manage local users and groups
Create, manage, and delete local users and groups, as well as administer local password policies.
Control access to files
Set Linux file system permissions on files and interpret the security effects of different permission settings.
Monitor and manage Linux processes
Evaluate and control processes running on a Red Hat Enterprise Linux system.
Control services and daemons
Control and monitor network services and system daemons using systemd.
Configure and secure SSH
Configure secure command line service on remote systems, using OpenSSH.
Analyze and store logs
Locate and accurately interpret logs of system events for troubleshooting purposes.
Manage networking
Configure network interfaces and settings on Red Hat Enterprise Linux servers.
Archive and transfer files
Archive and copy files from one system to another.
Install and update software
Download, install, update, and manage software packages from Red Hat and yum package repositories.
Access Linux files systems
Access, inspect, and use existing file systems on storage attached to a Linux server.
Analyze servers and get support
Investigate and resolve issues in the web-based management interface, getting support from Red Hat to help solve problems.
Comprehensive review
Review the content covered in this course by completing hands-on exercises.
ADMIN II
Improve command line productivity
Run commands more efficiently by using advanced features of the bash shell, shell scripts, and various utilities provided by Red Hat Enterprise Linux.
Schedule future tasks
Schedule commands to run in the future, either one time or on a repeating schedule.
Tune system performance
Improve system performance by setting tuning parameters and adjusting scheduling priority of processes.
Control access to files with ACLs
Interpret and set access control lists (ACLs) on files to handle situations requiring complex user and group access permissions.
Manage SELinux security
Protect and manage the security of a server by using SELinux.
Maintain basic storage
Create and manage storage devices, partitions, file systems, and swap spaces from the command line.
Manage logical volumes
Create and manage logical volumes containing file systems and swap spaces from the command line.
Implement advanced storage features
Manage storage using the Stratis local storage management system and use VDO volumes to optimize storage space in use.
Access network-attached storage
Use the NFS protocol to administer network-attached storage.
Control the boot process
Manage the boot process to control services offered and to troubleshoot and repair problems.
Manage network security
Control network connections to services using the system firewall and SELinux rules.
Install Red Hat Enterprise Linux
Install Red Hat Enterprise Linux on servers and virtual machines.