0% found this document useful (0 votes)
179 views9 pages

Red Hat System Administration Objectives

Download as docx, pdf, or txt
0% found this document useful (0 votes)
179 views9 pages

Red Hat System Administration Objectives

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1/ 9

Red Hat System Administration I (RHEL8) - Objective

Chapter 1: Getting Started with Red Hat Enterprise Linux

Section 1.1: What is Linux?

Section 1.2: Quiz: Getting Started with Red Hat Enterprise Linux

Section 1.3: Summary

Chapter 2: Accessing the Command Line

Section 2.1: Accessing the Command Line

Section 2.2: Quiz: Accessing the Command Line

Section 2.3: Accessing the Command Line Using the Desktop

Section 2.4: Guided Exercise: Accessing the Command Line Using the Desktop

Section 2.5: Executing Commands Using the Bash Shell

Section 2.6: Quiz: Executing Commands Using the Bash Shell

Section 2.7: Lab: Accessing the Command Line

Section 2.8: Summary

Chapter 3: Managing Files From the Command Line

Section 3.1: Describing Linux File System Hierarchy Concepts

Section 3.2: Quiz: Describing Linux File System Hierarchy Concepts

Section 3.3: Specifying Files by Name

Section 3.4: Quiz: Specifying Files by Name

Section 3.5: Managing Files Using Command-line Tools

Section 3.6: Guided Exercise: Managing Files Using Command-line Tools

Section 3.7: Making Links Between Files

Section 3.8: Guided Exercise: Making Links Between Files

Section 3.9: Matching File Names with Shell Expansions

Section 3.10: Quiz: Matching File Names with Shell Expansions

Section 3.11: Lab: Managing Files from the Command Line

Section 3.12: Summary

Chapter 4: Getting Help in Red Hat Enterprise Linux

Section 4.1: Reading Manual Pages

Section 4.2: Guided Exercise: Reading Manual Pages

Section 4.3: Reading Info Documentation


Section 4.4: Guided Exercise: Reading Info Documentation

Section 4.5: Lab: Getting Help in Red Hat Enterprise Linux

Section 4.6: Summary

Chapter 5: Creating, Viewing, and Editing Text Files

Section 5.1: Redirecting Output to a File or Program

Section 5.2: Quiz: Redirecting Output to a File or Program

Section 5.3: Editing Text Files from the Shell Prompt

Section 5.4: Guided Exercise: Editing Text Files from the Shell Prompt

Section 5.5: Changing the Shell Environment

Section 5.6: Guided Exercise: Changing the Shell Environment

Section 5.7: Lab: Creating, Viewing, and Editing Text Files

Section 5.8: Summary

Chapter 6: Managing Local Users and Groups

Section 6.1: Describing User and Group Concepts

Section 6.2: Quiz: Describing User and Group Concepts

Section 6.3: Gaining Superuser Access

Section 6.4: Guided Exercise: Gaining Superuser Access

Section 6.5: Managing Local User Accounts

Section 6.6: Guided Exercise: Managing Local User Accounts

Section 6.7: Managing Local Group Accounts

Section 6.8: Guided Exercise: Managing Local Group Accounts

Section 6.9: Managing User Passwords

Section 6.10: Guided Exercise: Managing User Passwords

Section 6.11: Lab: Managing Local Users and Groups

Section 6.12: Summary

Chapter 7: Controlling Access to Files

Section 7.1: Interpreting Linux File System Permissions

Section 7.2: Quiz: Interpreting Linux File System Permissions

Section 7.3: Managing File System Permissions from the Command Line

Section 7.4: Guided Exercise: Managing File System Permissions from the Command Line

Section 7.5: Managing Default Permissions and File Access


Section 7.6: Guided Exercise: Managing Default Permissions and File Access

Section 7.7: Lab: Controlling Access to Files

Section 7.8: Summary

Chapter 8: Monitoring and Managing Linux Processes

Section 8.1: Listing Processes

Section 8.2: Quiz: Listing Processes

Section 8.3: Controlling Jobs

Section 8.4: Guided Exercise: Controlling Jobs

Section 8.5: Killing Processes

Section 8.6: Guided Exercise: Killing Processes

Section 8.7: Monitoring Process Activity

Section 8.8: Guided Exercise: Monitoring Process Activity

Section 8.9: Lab: Monitoring and Managing Linux Processes

Section 8.10: Summary

Chapter 9: Controlling Services and Daemons

Section 9.1: Identifying Automatically Started System Processes

Section 9.2: Guided Exercise: Identifying Automatically Started System Processes

Section 9.3: Controlling System Services

Section 9.4: Guided Exercise: Controlling System Services

Section 9.5: Lab: Controlling Services and Daemons

Section 9.6: Summary

Chapter 10: Configuring and Securing SSH

Section 10.1: Accessing the Remote Command Line with SSH

Section 10.2: Guided Exercise: Accessing the Remote Command Line

Section 10.3: Configuring SSH Key-based Authentication

Section 10.4: Guided Exercise: Configuring SSH Key-based Authentication

Section 10.5: Customizing OpenSSH Service Configuration

Section 10.6: Guided Exercise: Customizing OpenSSH Service Configuration

Section 10.7: Lab: Configuring and Securing SSH

Section 10.8: Summary

Chapter 11: Analyzing and Storing Logs


Section 11.1: Describing System Log Architecture

Section 11.2: Quiz: Describing System Log Architecture

Section 11.3: Reviewing Syslog Files

Section 11.4: Guided Exercise: Reviewing Syslog Files

Section 11.5: Reviewing System Journal Entries

Section 11.6: Guided Exercise: Reviewing System Journal Entries

Section 11.7: Preserving the System Journal

Section 11.8: Guided Exercise: Preserving the System Journal

Section 11.9: Maintaining Accurate Time

Section 11.10: Guided Exercise: Maintaining Accurate Time

Section 11.11: Lab: Analyzing and Storing Logs

Section 11.12: Summary

Chapter 12: Managing Networking

Section 12.1: Describing Networking Concepts

Section 12.2: Quiz: Describing Networking Concepts

Section 12.3: Validating Network Configuration

Section 12.4: Guided Exercise: Validating Network Configuration

Section 12.5: Configuring Networking from the Command Line

Section 12.6: Guided Exercise: Configuring Networking from the Command Line

Section 12.7: Editing Network Configuration Files

Section 12.8: Guided Exercise: Editing Network Configuration Files

Section 12.9: Configuring Host Names and Name Resolution

Section 12.10: Guided Exercise: Configuring Host Names and Name Resolution

Section 12.11: Lab: Managing Networking

Section 12.12: Summary

Chapter 13: Archiving and Transferring Files

Section 13.1: Managing Compressed tar Archives

Section 13.2: Guided Exercise: Managing Compressed Tar Archives

Section 13.3: Transferring Files Between Systems Securely

Section 13.4: Guided Exercise: Transferring Files Between Systems Securely

Section 13.5: Synchronizing Files Between Systems Securely


Section 13.6: Guided Exercise: Synchronizing Files Between Systems Securely

Section 13.7: Lab: Archiving and Transferring Files

Section 13.8: Summary

Chapter 14: Installing and Updating Software Packages

Section 14.1: Registering Systems for Red Hat Support

Section 14.2: Quiz: Registering Systems for Red Hat Support

Section 14.3: Explaining and Investigating RPM Software Packages

Section 14.4: Guided Exercise: Explaining and Investigating RPM Software Packages

Section 14.5: Installing and Updating Software Packages with Yum

Section 14.6: Guided Exercise: Installing and Updating Software Packages with Yum

Section 14.7: Enabling Yum Software Repositories

Section 14.8: Guided Exercise: Enabling Yum Software Repositories

Section 14.9: Managing Package Module Streams

Section 14.10: Guided Exercise: Managing Package Module Streams

Section 14.11: Lab: Installing and Updating Software Packages

Section 14.12: Summary

Chapter 15: Accessing Linux File Systems

Section 15.1: Identifying File Systems and Devices

Section 15.2: Quiz: Identifying File Systems and Devices

Section 15.3: Mounting and Unmounting File Systems

Section 15.4: Guided Exercise: Mounting and Unmounting File Systems

Section 15.5: Locating Files on the System

Section 15.6: Guided Exercise: Locating Files on the System

Section 15.7: Lab: Accessing Linux File Systems

Section 15.8: Summary

Chapter 16: Analyzing Servers and Getting Support

Section 16.1: Analyzing and Managing Remote Servers

Section 16.2: Guided Exercise: Analyzing and Managing Remote Servers

Section 16.3: Getting Help From Red Hat Customer Portal

Section 16.4: Guided Exercise: Getting Help from Red Hat Customer Portal

Section 16.5: Detecting and Resolving Issues with Red Hat Insights
Section 16.6: Quiz: Detecting and Resolving Issues with Red Hat Insights

Section 16.7: Summary

Chapter 17: Comprehensive Review

Section 17.1: Comprehensive Review

Section 17.2: Lab: Managing Files from the Command Line

Section 17.3: Lab: Managing Users and Groups, Permissions and Processes

Section 17.4: Lab: Configuring and Managing a Server

Section 17.5: Lab: Managing Networks

Section 17.6: Lab: Mounting Filesystems and Finding Files

Red Hat System Administration II (RHEL8) – Objective

Chapter 1: Improving Command-line Productivity

Section 1.1: Writing Simple Bash Scripts

Section 1.2: Guided Exercise: Writing Simple Bash Scripts

Section 1.3: Running Commands More Efficiently Using Loops

Section 1.4: Guided Exercise: Running Commands More Efficiently Using Loops

Section 1.5: Matching Text in Command Output with Regular Expressions

Section 1.6: Guided Exercise: Matching Text in Command Output with Regular Expressions

Section 1.7: Lab: Improving Command-line Productivity

Section 1.8: Summary

Chapter 2: Scheduling Future Tasks

Section 2.1: Scheduling a Deferred User Job

Section 2.2: Guided Exercise: Scheduling a Deferred User Job

Section 2.3: Scheduling Recurring User Jobs

Section 2.4: Guided Exercise: Scheduling Recurring User Jobs

Section 2.5: Scheduling Recurring System Jobs

Section 2.6: Guided Exercise: Scheduling Recurring System Jobs

Section 2.7: Managing Temporary Files

Section 2.8: Guided Exercise: Managing Temporary Files

Section 2.9: Quiz: Scheduling Future Tasks

Section 2.10: Summary


Chapter 3: Tuning System Performance

Section 3.1: Adjusting Tuning Profiles

Section 3.2: Guided Exercise: Adjusting Tuning Profiles

Section 3.3: Influencing Process Scheduling

Section 3.4: Guided Exercise: Influencing Process Scheduling

Section 3.5: Lab: Tuning System Performance

Section 3.6: Summary

Chapter 4: Controlling Access to Files with ACLs

Section 4.1: Interpreting File ACLs

Section 4.2: Quiz: Interpreting File ACLs

Section 4.3: Securing Files with ACLs

Section 4.4: Guided Exercise: Securing Files with ACLs

Section 4.5: Lab: Controlling Access to Files with ACLs

Section 4.6: Summary

Chapter 5: Managing SELinux Security

Section 5.1: Changing the SELinux Enforcement Mode

Section 5.2: Guided Exercise: Changing the SELinux Enforcement Mode

Section 5.3: Controlling SELinux File Contexts

Section 5.4: Guided Exercise: Controlling SELinux File Contexts

Section 5.5: Adjusting SELinux Policy with Booleans

Section 5.6: Guided Exercise: Adjusting SELinux Policy with Booleans

Section 5.7: Investigating and Resolving SELinux Issues

Section 5.8: Guided Exercise: Investigating and Resolving SELinux Issues

Section 5.9: Lab: Managing SELinux Security

Section 5.10: Summary

Chapter 6: Managing Basic Storage

Section 6.1: Adding Partitions, File Systems, and Persistent Mounts

Section 6.2: Guided Exercise: Adding Partitions, File Systems, and Persistent Mounts

Section 6.3: Managing Swap Space

Section 6.4: Guided Exercise: Managing Swap Space

Section 6.5: Lab: Managing Basic Storage


Section 6.6: Summary

Chapter 7: Managing Logical Volumes

Section 7.1: Creating Logical Volumes

Section 7.2: Guided Exercise: Creating Logical Volumes

Section 7.3: Extending Logical Volumes

Section 7.4: Guided Exercise: Extending Logical Volumes

Section 7.5: Lab: Managing Logical Volumes

Section 7.6: Summary

Chapter 8: Implementing Advanced Storage Features

Section 8.1: Managing Layered Storage with Stratis

Section 8.2: Guided Exercise: Managing Layered Storage with Stratis

Section 8.3: Compressing and Deduplicating Storage with VDO

Section 8.4: Guided Exercise: Compressing and Deduplicating Storage with VDO

Section 8.5: Lab: Implementing Advanced Storage Features

Section 8.6: Summary

Chapter 9: Accessing Network-Attached Storage

Section 9.1: Mounting Network-Attached Storage with NFS

Section 9.2: Guided Exercise: Managing Network-Attached Storage with NFS

Section 9.3: Automounting Network-Attached Storage

Section 9.4: Guided Exercise: Automounting Network-Attached Storage

Section 9.5: Lab: Accessing Network-Attached Storage

Section 9.6: Summary

Chapter 10: Controlling the Boot Process

Section 10.1: Selecting the Boot Target

Section 10.2: Guided Exercise: Selecting the Boot Target

Section 10.3: Resetting the Root Password

Section 10.4: Guided Exercise: Resetting the Root Password

Section 10.5: Repairing File System Issues at Boot

Section 10.6: Guided Exercise: Repairing File System Issues at Boot

Section 10.7: Lab: Controlling the Boot Process

Section 10.8: Summary


Chapter 11: Managing Network Security

Section 11.1: Managing Server Firewalls

Section 11.2: Guided Exercise: Managing Server Firewalls

Section 11.3: Controlling SELinux Port Labeling

Section 11.4: Guided Exercise: Controlling SELinux Port Labeling

Section 11.5: Lab: Managing Network Security

Section 11.6: Summary

Chapter 12: Installing Red Hat Enterprise Linux

Section 12.1: Installing Red Hat Enterprise Linux

Section 12.2: Guided Exercise: Installing Red Hat Enterprise Linux

Section 12.3: Automating Installation with Kickstart

Section 12.4: Guided Exercise: Automating Installation with Kickstart

Section 12.5: Installing and Configuring Virtual Machines

Section 12.6: Quiz: Installing and Configuring Virtual Machines

Section 12.7: Lab: Installing Red Hat Enterprise Linux

Section 12.8: Summary

Chapter 13: Comprehensive Review

Section 13.1: Comprehensive Review

Section 13.2: Lab: Fixing Boot Issues and Maintaining Servers

Section 13.3: Lab: Configuring and Managing File Systems and Storage

Section 13.4: Lab: Configuring and Managing Server Security

You might also like