Training Red Hat

Training goals

This exam and the exam objectives provided here are based on the Red Hat Enterprise Linux 7 version of the exam. The performance-based RHCSA Exam (EX200) tests your knowledge and skill in areas of system administration common across a wide range of environments and deployment scenarios. You must be an RHCSA to earn a Red Hat Certified Engineer (RHCE) certification.

ADUDIENCE:

  • Experienced Red Hat Enterprise Linux system administrators seeking validation of their skills
  • Students who have attended Red Hat System Administration I and II and are on the path to earn RHCSA certification
  • Experienced Linux system administrators who require a certification either by their organization or based on a mandate (DOD 8570 directive)
  • IT professionals who are on the path to earn RHCE certification
  • An RHCE who is noncurrent or who is about to become noncurrent and wants to recertify as an RHCE

Conspect Show list

  1. Understand and use essential tools
    • Access a shell prompt and issue commands with correct syntax.
    • Use input-output redirection (>, >>, |, 2>, etc.).
    • Use grep and regular expressions to analyze text.
    • Access remote systems using ssh and VNC.
    • Log in and switch users in multiuser targets.
    • Archive, compress, unpack, and uncompress files using tar, star, gzip, and bzip2.
    • Create and edit text files.
    • Create, delete, copy, and move files and directories.
    • Create hard and soft links.
    • List, set, and change standard ugo/rwx permissions.
    • Locate, read, and use system documentation including man, info, and files in /usr/share/doc.
  2. Operate running systems
    • Boot, reboot, and shut down a system normally.
    • Boot systems into different targets manually.
    • Interrupt the boot process in order to gain access to a system.
    • Identify CPU/memory intensive processes, adjust process priority with renice, and kill processes.
    • Locate and interpret system log files and journals.
    • Access a virtual machine's console.
    • Start and stop virtual machines.
    • Start, stop, and check the status of network services.
    • Securely transfer files between systems.
  3. Configure local storage
    • List, create, delete partitions on MBR and GPT disks.
    • Create and remove physical volumes, assign physical volumes to volume groups, and create and delete logical Volumes.
    • Create and configure LUKS-encrypted partitions and logical volumes to prompt for password and mount a decrypted file system at boot.
    • Configure systems to mount file systems at boot by Universally Unique ID (UUID) or label.
    • Add new partitions and logical volumes, and swap to a system non-destructively.
  4. Create and configure file systems
    • Create, mount, unmount, and use vfat, ext4 and xfs file systems.
    • Mount, unmount, and use LUKS-encrypted file systems.
    • Mount and unmount CIFS and NFS network file systems.
    • Configure systems to mount LUKS-encrypted, and network file systems automatically.
    • Extend existing unencrypted logical volumes.
    • Create and configure set-GID directories for collaboration.
    • Create and manage Access Control Lists (ACLs).
    • Diagnose and correct file permission problems.
  5. Deploy, configure, and maintain systems
    • Configure networking and hostname resolution statically or dynamically.
    • Schedule tasks using at and cron.
    • Start and stop services and configure services to start automatically at boot.
    • Configure systems to boot into a specific target automatically.
    • Install Red Hat Enterprise Linux automatically using Kickstart.
    • Configure a physical machine to host virtual guests.
    • Install Red Hat Enterprise Linux systems as virtual guests.
    • Configure systems to launch virtual machines at boot.
    • Configure network services to start automatically at boot.
    • Configure a system to use time services.
    • Install and update software packages from Red Hat Network, a remote repository, or from the local file system.
    • Update the kernel package appropriately to ensure a bootable system.
    • Modify the system bootloader.
  6. Manage users and groups
    • Create, delete, and modify local user accounts.
    • Change passwords and adjust password aging for local user accounts.
    • Create, delete, and modify local groups and group memberships.
    • Configure a system to use an existing LDAP directory service for user and group information.
    • Configure a system to use an existing authentication service for user and group information.
  7. Manage security
    • Configure firewall settings using system-config-firewall or iptables.
    • Configure key-based authentication for SSH.
    • Set enforcing and permissive modes for SELinux.
    • List and identify SELinux file and process context.
    • Restore default file contexts.
    • Use boolean settings to modify system SELinux settings.
    • Diagnose and address routine SELinux policy violations
Download conspect training as PDF

Additional information

Requirements
Difficulty level
Duration 1 day
Certificate

Participants will obtain certificates signed by Red Hat.

Trainer

Red Hat Certified Instructor

Other training Red Hat | Exams and certification

Training thematically related

Operation Systems

Linux

Contact form

Please fill form below to obtain more info about this training.







* Fields marked with (*) are required !!!

Information on data processing by Compendium - Centrum Edukacyjne Spółka z o.o.

215 EUR

close

Discount codes

Discount code may refer to (training, producer, deadline). If you have a discount code, enter it in the appropriate field.
(green means entering the correct code | red means the code is incorrect)

SELECT TERM TRAINING

No deadlines for this training.

Suggest your own appointment