• Online, Self-Paced
Course Description

All Linux Administrators must know how to manipulate and manage processes, be able to configure networking, and know how the logging system works. This course provides an introduction to Processes, Services, and Daemons and how to manage them in Linux. You will also learn about networking and how to configure basic networking on a Linux system. Then you will learn about the system logs and how to access and use them. This course is one of a series in the Skillsoft learning path that covers the objectives for the Red Hat Enterprise Linux 7 RHCSA exam (EX200).

Learning Objectives

Processes

  • start the course
  • list and identify running processes
  • recognize common running processes
  • monitor processes and their resource utilization
  • start and stop processes
  • set or change the priority for a process
  • troubleshoot or identify problem processes

 

Services/Daemons

  • start and stop a network service
  • configure a service to start or not start at boot

 

SystemD Processes

  • use SystemD to start services
  • work with SystemD to manage running services
  • use SystemD to manage the system

 

Introduction to Networking

  • describe basic networking terminology and interfaces on Linux
  • identify network devices and their configuration
  • use the Gnome network manager to configure a network device
  • change the hostname, DNS, and other network settings for the host; including deactivating and activating a network device
  • configure a network device entirely from the shell
  • configure the system to use a network time source
  • configure Linux systems with common network scenarios

 

Logging

  • list the location of log files and the purpose of the common logs
  • view and analyze log files and interpret basic values from other journal sources
  • review SystemD journal logs
  • configure SystemD journals to forward system messages to traditional system logging tools
  • store and archive logs
  • configure what is logged to system logs
  • modify the system log settings and retention policies

 

Practice: Working with Processes and Networking

  • use renice to change a processes priority, change a network adapter's IP Address and check the logs for any unauthorized access attempts

 

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.