UKI's Administering Red Hat Level 2

4 Day | Instructor Led

This course is for individuals who have completed Red Hat® System Administration I (RH124). It focuses on the key tasks needed to become a full-time administrator of Red Hat Enterprise Linux 7. Attending both UKI's Administering Red Hat® Level I and UKI's Administering Red Hat® Level 2 can help you in your preparation for the Red Hat Certified System Administrator Exam (EX200).

UKI is not affiliated with or endorsed by Red Hat or any of its affiliates.

Inquire About
UKI's Administering Red Hat Level 2

Ideal Candidates for UKI's Administering Red Hat Level 2 Class

Individuals who have completed Red Hat® System Administration I
Individuals that have not taken a previous Red Hat course are encouraged to take either Red Hat® System Administration I (RH124) if they are new to Linux, or the RHCSA® Rapid Track Course with Exam (RH200) if they are experienced with enterprise Linux administration

UKI's Administering Red Hat Level 2 Prerequisites

UKI's Administering Red Hat® Level I

What You'll Get in UKI's Administering Red Hat Level 2

What You'll Learn in UKI's Administering Red Hat Level 2

Installation using Kickstart
Managing filesystems and logical volumes
Managing scheduled jobs
Accessing network filesystems
Managing SELinux
Controlling firewalling
Troubleshooting

UKI's Administering Red Hat Level 2 Certification

RHCSA – Red Hat Certified System Administrator

UKI's Administering Red Hat Level 2 Outline

  1. Automate installation with Kickstart
  2. Automate the installation of Red Hat Enterprise Linux systems with Kickstart
  3. Use regular expressions with grep
  4. Write regular expressions that, when partnered with grep, will allow you to quickly isolate or locate content within text files
  5. Create and Edit text files with vim
  6. Introduce the vim text editor, with which you can open, edit, and save text files
  7. Schedule future Linux tasks
  8. Schedule tasks to automatically execute in the future
  9. Manage priority of Linux processes
  10. Influence the relative priorities at which Linux processes run
  11. Control access to files with access control lists (ACL)
  12. Manage file security using POSIX access control lists
  13. Manage SELinux security
  14. Manage the Security Enhanced Linux (SELinux) behavior of a system to keep it secure in case of a network service compromise
  15. Connect to network-defined users and groups
  16. Configure systems to use central identity management services
  17. Add disks, partitions, and file systems to a Linux system
  18. Manage simple partitions and file systems
  19. Manage logical volume management (LVM) storage
  20. Manage logical volumes from the command-line
  21. Access networked attached storage with network file system (NFS)
  22. Access (secure) NFS shares
  23. Access networked storage with SMB
  24. Use autofs and the command-line to mount and unmount SMB file systems
  25. Control and troubleshoot the Red Hat Enterprise Linux boot process
  26. Limit network communication with firewall
  27. Configure a basic firewall
  28. Comprehensive review
  29. Practice and demonstrate knowledge and skills learned in this course

Testimonials

A. Erlich

RITSC, N6C

I just wanted to say your presentation on Social Media Technology and Security was the finest I have ever attended.

Wilder Guerra

US Navy Reserve

This course is definitely an eye opener. With how much social media has taken over, it is important to be fully aware of the capabilities along with all the risks it brings. It is important to get this course because social media is the new norm.

Rebekah Coughlin

MicroTech

The Social Media and Security Training course offered by UKI is a great and beneficial course combining technical training to fully understand TCP IP networking, DNS, and the harms of malware and cross-site scripting; as well as practical training that allowed attendees to play with open source social intelligence gathering solutions. This is the perfect class for those involved in IT security and interested in social media and identity theft.


Top Related Courses

An introduction to fundamental end-user and administrative tools in Red Hat Enterprise Linux, designed for students with little or no command-line Linux or UNIX experience.



This course relates to Red Hat Enterprise Linux 7 and is for IT professionals without previous Linux administration experience. You will learn Linux administration "survival skills" by focusing on core administration tasks. System Admin I also provides a foundation for individuals wishing to become full-time Linux system administrators by introducing key command-line concepts and other enterprise-level tools

UKI is not affiliated with or endorsed by Red Hat or any of its affiliates.



Red Hat System Administration III , related to Red Hat Enterprise Linux 7, is designed for experienced Linux system administrators who hold a Red Hat Certified System Administrator (RHCSA) certification or equivalent skills and who want to broaden their ability to administer Linux systems at an enterprise level. The course is focused on deploying and managing network servers running caching Domain Name Service (DNS), MariaDB, Apache HTTPD, Postfix SMTP nullclients, network file sharing with Network File System (NFS) and Server Message Block (SMB), iSCSI initiators and targets, advanced networking and firewalld configurations, and using Bash shell scripting to help automate, configure, and troubleshoot the system. Through lectures and hands-on labs, RHCSA-certified professionals will be exposed to all competencies covered by the Red Hat Certified Engineer (RHCE) exam.

UKI is not affiliated with or endorsed by Red Hat or any of its affiliates.



© 2018 Ultimate Knowledge Insitute | All Rights Reserved | GSA# GS-35F-0469W