Red Hat System Administration I

5 Day | Instructor Led

his course relates to Red Hat Enterprise Linux 7 and is for IT professionals without previous Linux administration experience. You will learn Linux administration "survival skills" by focusing on core administration tasks. System Admin I also provides a foundation for individuals wishing to become full-time Linux system administrators by introducing key command-line concepts and other enterprise-level tools

Inquire About
Red Hat System Administration I

Ideal Candidates for Red Hat System Administration I Class

IT professionals across a broad range of disciplines who need to perform essential Linux administration tasks including installation, establishing network connectivity, managing physical storage, and basic security administration

Red Hat System Administration I Prerequisites

There Are No PreRequisites Defined for this Course

What You'll Get in Red Hat System Administration I

What You'll Learn in Red Hat System Administration I

Introduction to the command line
Managing physical storage
Learning how to install and configure software components and services
Establishing network connections and firewall access
Monitoring and managing processes
Managing and securing files
Administrating users and groups
Accessing Linux file systems
Installing and using virtualized systems
Reviewing the system log files and journal

Red Hat System Administration I Certification

RHCSA – Red Hat Certified System Administrator

Red Hat System Administration I Outline

  1. Access the command line
  2. Log in to a Linux system and run simple commands using the shell
  3. Manage files from the command line
  4. Copy, move, create, delete, and organize files from the bash shell prompt
  5. Getting help in Red Hat Enterprise Linux
  6. Resolve problems by using online help systems and Red Hat support utilities
  7. Create, view, and edit text files
  8. Create, view, and edit text files from command output or in an editor
  9. Manage local Linux users and groups
  10. Manage local Linux users and groups, and administer local password policies
  11. Control access to files with Linux file system permissions
  12. Set Linux file system permissions on files and interpret the security effects of different permission settings
  13. Monitor and manage Linux processes
  14. Obtain information about the system, and control processes running on it
  15. Control services and daemons
  16. Control and monitor network services and system daemons using systemd
  17. Configure and secure OpenSSH service
  18. Access and provide access to the command line on remote systems securely using OpenSSH
  19. Analyze and store logs
  20. Locate and accurately interpret relevant system log files for troubleshooting purposes
  21. Manage Red Hat Enterprise Linux networking
  22. Configure basic IPv4 networking on Red Hat Enterprise Linux systems
  23. Archive and copy files between systems
  24. Archive files and copy them from one system to another
  25. Install and update software packages
  26. Download, install, update, and manage software packages from Red Hat and yum package repositories
  27. Access Linux file systems
  28. Access and inspect existing file systems on a Red Hat Enterprise Linux system.
  29. Use virtualized systems
  30. Create and use Red Hat Enterprise Linux virtual machines with KVM and libvirt
  31. Comprehensive review
  32. Practice and demonstrate the knowledge and skills learned in this course.

Testimonials

A. Erlich

RITSC, N6C

I just wanted to say your presentation on Social Media Technology and Security was the finest I have ever attended.

Wilder Guerra

US Navy Reserve

This course is definitely an eye opener. With how much social media has taken over, it is important to be fully aware of the capabilities along with all the risks it brings. It is important to get this course because social media is the new norm.

Rebekah Coughlin

MicroTech

The Social Media and Security Training course offered by UKI is a great and beneficial course combining technical training to fully understand TCP IP networking, DNS, and the harms of malware and cross-site scripting; as well as practical training that allowed attendees to play with open source social intelligence gathering solutions. This is the perfect class for those involved in IT security and interested in social media and identity theft.


Top Related Courses

CompTIA Linux+

CompTIA Linux+ Powered by LPI is a vendor-neutral certification, generic across distributions, targeted to individuals with a minimum of six to 12 months of practical Linux experience. The CompTIA Linux+ Powered by LPI exam covers fundamental management of Linux systems from the command line, user administration, file permissions, software configuration and management of Linux-based clients.


© 2017 Ultimate Knowledge Insitute | All Rights Reserved | GSA# GS-35F-0469W