EXCEPTIONAL TRAINING COURSES FOR IT PROFESSIONALS
LONDON UK | ONSITE | ONLINE
This course covers the same topics as the Red Hat System Administration II (RH135) course.
The course focuses on the key tasks needed to become a full time Linux administrator. It goes deep into enterprise Linux administration including file systems and partitioning, logical volumes, SELinux, firewalling and troubleshooting. Attending both Red Hat System Administration I and Red Hat System Administration II can help in the preparation for the Red Hat Certified System Administrator (RHCSA) exam. This performance based exam (EX200) tests the users knowledge and skill in areas of system administration common across a wide range of environments and deployment scenarios.
Anaconda: An Overview
Anaconda: Booting the System
Anaconda: Common Boot Options
Anaconda: Loading Anaconda and Packages
Anaconda: Storage Options
Automating Installation with Kickstart
Searching Inside Files
The Streaming Editor
Regular Expression Overview
RE Character Classes
Pattern Matching with Regular Expressions
Extended Regular Expressions
Using Regular Expressions With sed
vi and Vim
Text Editing with Vim
The crontab Command
Creating and Managing User Cron Jobs
Adding System cron Jobs
Tuning Process Scheduling
Process Management Basics
File and Directory Permissions
File Access Control Lists
Backing Up FACLs
Using Filesystem ACLs
SELinux Security Framework
Choosing an SELinux Policy
SELinux Policy Tools
SELinux Troubleshooting Continued
Exploring SELinux Modes
SELinux File Contexts
RHEL DS Client Configuration
System Security Services Daemon (SSSD)
Using LDAP for Centralized User Accounts
ADD DISKS, PARTITIONS AND FILE SYSTEMS
Partitioning Disks with fdisk & gdisk
Resizing a GPT Partition with gdisk
Partitioning Disks with parted
Managing an XFS Filesystem
Creating and Managing Filesystems
Hot Adding Swap
Logical Volume Management
Creating Logical Volumes
Activating LVM VGs
Exporting and Importing a VG
Examining LVM Components
Changing LVM Components
Advanced LVM Overview
Advanced LVM: Components & Object Tags
Advanced LVM: Automated Storage Tiering
Advanced LVM: Thin Provisioning
Advanced LVM: Striping & Mirroring
Advanced LVM: RAID Volumes
Creating and Managing LVM Volumes
File Sharing via NFS
NFS Server Configuration
NFS Server Configuration
ACCESS NETWORKED STORAGE WITH SAMBA (SMB)
Accessing Windows/Samba Shares from Linux
System Boot Method Overview
systemd System and Service Manager
Legacy Support for SysV init
Booting Linux on PCs
GRUB 2 Configuration
GRUB 2 Security
Initial RAM Filesystem
Linux Runlevels Aliases
Systemd local-fs.target and sysinit.target
Systemd basic.target and multi-user.target
Legacy local bootup script support
System Configuration Files
RHEL7 Configuration Utilities
Shutdown and Reboot
Booting directly to a bash shell
GRUB Command Line
Basic GRUB Security
Managing Services With Systemd's systemctl
Creating a systemd unit file
Troubleshooting Practice: Boot Process
Netfilter: Stateful Packet Filter Firewall
Using the iptables Command
Netfilter Rule Syntax
Securing Services with Netfilter
Command Sheet by Description, Command Sheet by Command, vi Prompt
See why people choose JBI
Call our Tech Team : 0800 028 6400 request info
Bring a JBI course to your office
and train a whole team onsite
0800 028 6400 or request quote
Get in touch
0800 028 6400
The training was to target a team of developers, with a mix of Java, C# and some C++. The team made heavy use of Java SE with some elements of...
The Graduate Programme provided a gateway into technology within investment banking. Graduates (Computer Science, Engineering, Maths, Physics...
When a leading High Street Retailer (and purveyor of fine foods) recognised that teams of software engineers were writing overcomplicated and...
Our inspiring and up-to-date courses gain exceptional feedback
"great tips to help reduce build times"
"we got access to exclusive content"
"intensive course meant less time off"
"what an inspiring trainer !"
"colleagues at 2 sites joined via web"
"I passed my exam the next day"
Debates on the present state of C++ in the programming world divide the participants into two camps: some dislike C++ and predict it's imminent...
Traditionally Cyber security has been associated mainly with penetrating networks and infrastructure. Now a more subtle level of attack needs...
Back in March 2014, the Angular team dropped a bomb by announcing Angular 2 and everyone started yelling. Instead of an evolutionary step forward,...