The Red Hat Enterprise Linux System Administration II course builds upon the foundational skills acquired in the first administration course | diving deeper into more complex system administration tasks. This course is tailored for IT professionals looking to enhance their skills in managing Red Hat Enterprise Linux environments by covering advanced topics such as shell scripting| managing SELinux security| and working with network-attached storage. By focusing on real-world applications| the course ensures that participants are well-equipped to handle the intricacies of enterprise-level system administration.
The Red Hat Enterprise Linux (RHEL) system administration topics covered in this course along with the course cover the certification objects of the Red Hat Certified System Administrator (RHCSA) exam.
Supported Distributions: Red Hat Enterprise Linux 9| Current Version: R9-D00
Learning Objectives
Course Details
INTRODUCTION TO SHELL SCRIPTING
Shell Script Strengths and Weaknesses
Example Shell Script| Positional Parameters
Input & Output| Doing Math| Exit Status
Comparisons with test
Conditional Statements
Flow Control: case
The borne for-Loop
The while and until Loops
Lab Tasks
Writing a Shell Script
USE REGULAR EXPRESSIONS WITH GREP
Searching Inside Files
Regular Expression Overview
Regular Expression Implementations
Regular Expressions| RE Character Classes
Regex Quantifiers
RE Parenthesis
Lab Tasks
Pattern Matching with Regular Expressions
Extended Regular Expressions
Using Regular Expressions With sed
SCHEDULE FUTURE LINUX TASKS
Automating Tasks
at/batch| cron| The crontab Command
crontab Format| /etc./cron.*/ Directories
Anacron| Systemd Timers
Lab Tasks
Creating and Managing User Cron Jobs
Adding System cron Jobs
MANAGE PRIORITY OF LINUX PROCESSES
Viewing Processes
Managing Processes
Tuning Process Scheduling
Lab Tasks
Process Management Basics
CONTROL ACCESS TO FILES WITH ACCESS CONTROL LISTS (ACL)
File and Directory Permissions
File Access Control Lists
Manipulating FACLs
Viewing FACLs
Backing Up FACLs
Lab Tasks
Using Filesystem ACLs
MANAGE SELINUX SECURITY
SELinux Security Framework
SELinux Modes and Commands
Choosing an SELinux Policy
SELinux Booleans| Permissive Domains
SELinux Policy Tools and Troubleshooting
Lab Tasks
Exploring SELinux Modes
SELinux File Contexts
CONNECT TO NETWORK-DEFINED USERS AND GROUPS
RHEL DS Client Configuration
System Security Services Daemon (SSSD)
Lab Tasks
Using LDAP for Centralized User Accounts
ADD DISKS| PARTITIONS| AND FILE SYSTEMS TO A LINUX SYSTEM
Partitioning Disks with fdisk & gdisk
Resizing a GPT Partition with gdisk
Partitioning Disks with parted
Non-Interactive Disk Partitioning with sfdisk
Filesystem Creation
Filesystem Maintenance
Managing an XFS Filesystem
Swap
Lab Tasks
Creating and Managing Filesystems
Hot Adding Swap
MANAGE LOGICAL VOLUME MANAGEMENT (LVM) STORAGE
Logical Volume Management| Implementing LVM
Creating Logical Volumes| Activating LVM VGs
Exporting and Importing a VG| Examining LVM Components
Changing LVM Components| Advanced LVM Overview
Advanced LVM: Components & Object Tags
Advanced LVM: Automated Storage Tiering
Advanced LVM: Thin Provisioning
Advanced LVM: Striping & Mirroring
Advanced LVM: RAID Volumes
Lab Tasks
Creating and Managing LVM Volumes
ACCESS AND MANAGE NETWORK ATTACHED STORAGE
File Sharing via NFS
NFSv4+| NFS Clients| NFS| NFS Server Configuration
Accessing Windows/Samba Shares from Linux
AutoFS| AutoFS Configuration
Lab Tasks
NFS Server Configuration| Using autofs
CONTROL AND TROUBLESHOOT THE RED HAT ENTERPRISE LINUX BOOT PROCESS
Booting Linux on PCs
GRUB 2| GRUB 2 Configuration
The Boot Loader Specification| GRUB 2 Security
Boot Parameters| Initial RAM Filesystem
System Boot Method Overview| init
systemd Targets
Systemd local-fs.target and sysinit.target
Systemd basic.target and multi-user. Target
System Configuration Files
Shutdown and Reboot| Linux Run levels Aliases
Lab Tasks| Boot Process| Booting directly to a bash shell
GRUB Command Line| Basic GRUB Security| Troubleshooting Practice: Boot Process
LINUX NETWORK COMMUNICATION WITH FIREWALL
Netfilter: Stateful Packet Filter Firewall
Netfilter Concepts| nftables
NFT: Tables| Chains| Rules
Netfilter Rule Syntax
Rule Counters| Targets| FirewallD
CONTAINER TECHNOLOGY OVERVIEW
Container Fundamentals
Daemonless Containers
Podman| Podman Configuration| Images| Volumes
Podman Networking
Rootless Podman
Podman and Pods
Building Images with Buildah
Managing Images with Skopeo
Lab Tasks
Podman | Podman Networking
Podman and Pods
INSTALLING RHEL
Anaconda: An Overview| Booting the System
Anaconda: Common Boot Options
Anaconda: Loading Anaconda and Packages
Anaconda: Storage Options
Anaconda: Troubleshooting
Kickstart
Lab Tasks
Linux Installation
Automating Installation with Kickstart
COMPREHENSIVE REVIEW
System Administration II
Labs
Understand And Use Essential Tools
Operate Running Systems
Configure Local Storage and Filesystems
Users| Groups| and File Permissions
Maintenance and Recovery
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):