UKI's Administering Red Hat Level 3

4 Day | Instructor Led

Red Hat System Administration III , related to Red Hat Enterprise Linux 7, is designed for experienced Linux system administrators who hold a Red Hat Certified System Administrator (RHCSA) certification or equivalent skills and who want to broaden their ability to administer Linux systems at an enterprise level. The course is focused on deploying and managing network servers running caching Domain Name Service (DNS), MariaDB, Apache HTTPD, Postfix SMTP nullclients, network file sharing with Network File System (NFS) and Server Message Block (SMB), iSCSI initiators and targets, advanced networking and firewalld configurations, and using Bash shell scripting to help automate, configure, and troubleshoot the system. Through lectures and hands-on labs, RHCSA-certified professionals will be exposed to all competencies covered by the Red Hat Certified Engineer (RHCE) exam.

UKI is not affiliated with or endorsed by Red Hat or any of its affiliates.

Inquire About:
UKI's Administering Red Hat Level 3

Ideal Candidates for UKI's Administering Red Hat Level 3 Class

Experienced Linux administrators who have earned RHCSA certification or have equivalent skills and wish to learn enterprise-level automation techniques through scripting, how to deploy and secure network services, and how to manage other key security features of Red Hat Enterprise Linux

UKI's Administering Red Hat Level 3 Prerequisites


What You'll Get in UKI's Administering Red Hat Level 3

What You'll Learn in UKI's Administering Red Hat Level 3

Network port security and link aggregation
iSCSI initiator and target configuration
DNS troubleshooting and caching name server
Provisioning NFS and SMB file servers
Apache HTTPD web server management
MariaDB SQL database configuration
Postfix SMTP nullclient for servers
Bash scripting for automation

No Certification Test Available For This Course

No Certification Test Available For This Course

UKI's Administering Red Hat Level 3 Outline

1. Control Services and Daemons

Review how to manage services and the boot-up process using systemctl.

2. Manage IPv6 Networking

Configure and troubleshoot basic IPv6 networking on Red Hat Enterprise Linux systems.

3. Configure Link Aggregation and Bridging

Configure and troubleshoot advanced network interface functionality, including bonding, teaming, and local software bridges.

4. Control Network Port Security

Permit and reject access to network services using advanced SELinux and firewalld filtering techniques.

5. Manage DNS for Servers

Set and verify correct DNS records for systems and configure secure DNS caching.

6. Configure Email Delivery

Relay all email sent by the system to an SMTP gateway for central delivery.

7. Provide Block-Based Storage

Provide and use networked iSCSI block devices as remote disks.

8. Provide File-Based Storage

Provide NFS exports and SMB file shares to specific systems and users.

9. Configure MariaDB Databases

Provide a MariaDB SQL database for use by programs and database administrators.

10. Provide Apache HTTPD Web Service

Configure Apache HTTPD to provide Transport Layer Security (TLS)-enabled websites and virtual hosts.

11. Write Bash Scripts

Write simple shell scripts using Bash.

12. Bash Conditionals and Control Structures

Use Bash conditionals and other control structures to write more sophisticated shell commands and scripts.

13. Configure the Shell Environment

Customize Bash startup and use environment variables, Bash aliases, and Bash functions.

14. Linux Containers Preview

Preview the capabilities of Linux containers, Docker, and other related technologies in Red Hat Enterprise Linux 7.

15. Comprehensive Review

Practice and demonstrate knowledge and skills learned in Red Hat System Administration III.


A. Erlich


I just wanted to say your presentation on Social Media Technology and Security was the finest I have ever attended.

Wilder Guerra

US Navy Reserve

This course is definitely an eye opener. With how much social media has taken over, it is important to be fully aware of the capabilities along with all the risks it brings. It is important to get this course because social media is the new norm.

Rebekah Coughlin


The Social Media and Security Training course offered by UKI is a great and beneficial course combining technical training to fully understand TCP IP networking, DNS, and the harms of malware and cross-site scripting; as well as practical training that allowed attendees to play with open source social intelligence gathering solutions. This is the perfect class for those involved in IT security and interested in social media and identity theft.

Top Related Courses

An introduction to fundamental end-user and administrative tools in Red Hat Enterprise Linux, designed for students with little or no command-line Linux or UNIX experience.

This course relates to Red Hat Enterprise Linux 7 and is for IT professionals without previous Linux administration experience. You will learn Linux administration "survival skills" by focusing on core administration tasks. System Admin I also provides a foundation for individuals wishing to become full-time Linux system administrators by introducing key command-line concepts and other enterprise-level tools

UKI is not affiliated with or endorsed by Red Hat or any of its affiliates.

This course is for individuals who have completed Red Hat® System Administration I (RH124). It focuses on the key tasks needed to become a full-time administrator of Red Hat Enterprise Linux 7. Attending both UKI's Administering Red Hat® Level I and UKI's Administering Red Hat® Level 2 can help you in your preparation for the Red Hat Certified System Administrator Exam (EX200).

UKI is not affiliated with or endorsed by Red Hat or any of its affiliates.

© 2019 Ultimate Knowledge Insitute | All Rights Reserved
GSA# GS-35F-0469W