UKI's Administering Red Hat Level 1

5 Day | Instructor Led

This course relates to Red Hat Enterprise Linux 7 and is for IT professionals without previous Linux administration experience. You will learn Linux administration "survival skills" by focusing on core administration tasks. System Admin I also provides a foundation for individuals wishing to become full-time Linux system administrators by introducing key command-line concepts and other enterprise-level tools

UKI is not affiliated with or endorsed by Red Hat or any of its affiliates.

Inquire About:
UKI's Administering Red Hat Level 1

Ideal Candidates for UKI's Administering Red Hat Level 1 Class

IT professionals across a broad range of disciplines who need to perform essential Linux administration tasks including installation, establishing network connectivity, managing physical storage, and basic security administration

UKI's Administering Red Hat Level 1 Prerequisites

There Are No PreRequisites Defined for this Course

What You'll Get in UKI's Administering Red Hat Level 1

What You'll Learn in UKI's Administering Red Hat Level 1

Introduction to the command line
Managing physical storage
Learning how to install and configure software components and services
Establishing network connections and firewall access
Monitoring and managing processes
Managing and securing files
Administrating users and groups
Accessing Linux file systems
Installing and using virtualized systems
Reviewing the system log files and journal

UKI's Administering Red Hat Level 1 Certification

RHCSA – Red Hat Certified System Administrator

UKI's Administering Red Hat Level 1 Outline

  1. Access the command line
  2. Log in to a Linux system and run simple commands using the shell
  3. Manage files from the command line
  4. Copy, move, create, delete, and organize files from the bash shell prompt
  5. Getting help in Red Hat Enterprise Linux
  6. Resolve problems by using online help systems and Red Hat support utilities
  7. Create, view, and edit text files
  8. Create, view, and edit text files from command output or in an editor
  9. Manage local Linux users and groups
  10. Manage local Linux users and groups, and administer local password policies
  11. Control access to files with Linux file system permissions
  12. Set Linux file system permissions on files and interpret the security effects of different permission settings
  13. Monitor and manage Linux processes
  14. Obtain information about the system, and control processes running on it
  15. Control services and daemons
  16. Control and monitor network services and system daemons using systemd
  17. Configure and secure OpenSSH service
  18. Access and provide access to the command line on remote systems securely using OpenSSH
  19. Analyze and store logs
  20. Locate and accurately interpret relevant system log files for troubleshooting purposes
  21. Manage Red Hat Enterprise Linux networking
  22. Configure basic IPv4 networking on Red Hat Enterprise Linux systems
  23. Archive and copy files between systems
  24. Archive files and copy them from one system to another
  25. Install and update software packages
  26. Download, install, update, and manage software packages from Red Hat and yum package repositories
  27. Access Linux file systems
  28. Access and inspect existing file systems on a Red Hat Enterprise Linux system.
  29. Use virtualized systems
  30. Create and use Red Hat Enterprise Linux virtual machines with KVM and libvirt
  31. Comprehensive review
  32. Practice and demonstrate the knowledge and skills learned in this course.


A. Erlich


I just wanted to say your presentation on Social Media Technology and Security was the finest I have ever attended.

Wilder Guerra

US Navy Reserve

This course is definitely an eye opener. With how much social media has taken over, it is important to be fully aware of the capabilities along with all the risks it brings. It is important to get this course because social media is the new norm.

Rebekah Coughlin


The Social Media and Security Training course offered by UKI is a great and beneficial course combining technical training to fully understand TCP IP networking, DNS, and the harms of malware and cross-site scripting; as well as practical training that allowed attendees to play with open source social intelligence gathering solutions. This is the perfect class for those involved in IT security and interested in social media and identity theft.

Top Related Courses

An introduction to fundamental end-user and administrative tools in Red Hat Enterprise Linux, designed for students with little or no command-line Linux or UNIX experience.

This course is for individuals who have completed Red Hat® System Administration I (RH124). It focuses on the key tasks needed to become a full-time administrator of Red Hat Enterprise Linux 7. Attending both UKI's Administering Red Hat® Level I and UKI's Administering Red Hat® Level 2 can help you in your preparation for the Red Hat Certified System Administrator Exam (EX200).

UKI is not affiliated with or endorsed by Red Hat or any of its affiliates.

Red Hat System Administration III , related to Red Hat Enterprise Linux 7, is designed for experienced Linux system administrators who hold a Red Hat Certified System Administrator (RHCSA) certification or equivalent skills and who want to broaden their ability to administer Linux systems at an enterprise level. The course is focused on deploying and managing network servers running caching Domain Name Service (DNS), MariaDB, Apache HTTPD, Postfix SMTP nullclients, network file sharing with Network File System (NFS) and Server Message Block (SMB), iSCSI initiators and targets, advanced networking and firewalld configurations, and using Bash shell scripting to help automate, configure, and troubleshoot the system. Through lectures and hands-on labs, RHCSA-certified professionals will be exposed to all competencies covered by the Red Hat Certified Engineer (RHCE) exam.

UKI is not affiliated with or endorsed by Red Hat or any of its affiliates.

© 2019 Ultimate Knowledge Insitute | All Rights Reserved
GSA# GS-35F-0469W