Bookmark this page

Chapter 15.  Comprehensive Review of System Administration II

Abstract

Overview
Goal To practice and demonstrate knowledge and skills learned in Red Hat System Administration II.
Objectives

  • Review the course chapters to reinforce knowledge and skills.

Sections
  • Red Hat System Administration II Comprehensive Review

Lab
  • Comprehensive Review of System Administration II

Red Hat System Administration II Comprehensive Review

  • Review chapters to validate knowledge level.

  • Review practice exercises to validate skill level.

Objectives

After completing this section, students should be able to demonstrate knowledge and skill of the topics covered in each chapter.

Reviewing Red Hat System Administration II

Before beginning the comprehensive review for this course, students should be comfortable with the topics covered in each chapter.

Students can refer to earlier sections in the textbook for extra study.

Chapter 1, Automating Installation with Kickstart

To automate the installation of Red Hat Enterprise Linux systems with Kickstart.

  • Explain Kickstart concepts and architecture.

  • Create a Kickstart configuration file.

Chapter 2, Using Regular Expressions with grep

To write regular expressions using grep to isolate or locate content in text files.

  • Create regular expressions to match text patterns.

  • Use grep to locate content in files.

Chapter 3, Creating and Editing Text Files with vim

Introduce the vim text editor.

  • Explain the three main modes of vim.

  • Open, edit, and save text files.

  • Use editor shortcuts.

Chapter 4, Scheduling Future Linux Tasks

Schedule tasks to automatically execute in the future.

  • Schedule one-time tasks with at.

  • Schedule recurring jobs with cron.

  • Schedule recurring system jobs.

  • Manage temporary files.

Chapter 5, Managing Priority of Linux Processes

To influence the relative priorities at which Linux processes run.

  • Describe nice levels.

  • Set nice levels on new and existing processes.

Chapter 6, Controlling Access to Files with Access Control Lists (ACLs)

To manage file security using POSIX access control lists (ACLs).

  • Describe POSIX access control lists.

  • Manage POSIX access control lists.

Chapter 7, Managing SELinux Security

To manage the Security Enhanced Linux (SELinux) behavior of a system to keep it secure in case of a network service compromise.

  • Explain the basics of SELinux permissions.

  • Change SELinux modes with setenforce.

  • Change file contexts with semanage and restorecon.

  • Manage SELinux booleans with setsebool.

  • Examine logs and use sealert to troubleshoot SELinux violations.

Chapter 8, Connecting to Network-defined Users and Groups

To configure systems to use central identity management services.

  • Use centralized identity management services.

Chapter 9, Adding Disks, Partitions, and File Systems to a Linux System

To create and manage disks, partitions, and file systems from the command line.

  • Manage simple partitions and file systems.

  • Manage swap space.

Chapter 10, Managing Logical Volume Management (LVM) Storage

To manage logical volumes from the command line.

  • Describe logical volume management components and concepts.

  • Manage logical volumes.

  • Extend logical volumes.

Chapter 11, Accessing Network Storage with Network File System (NFS)

To use autofs and the command line to mount and unmount network storage with NFS.

  • Mount, access, and unmount network storage with NFS.

  • Automount and access network storage with NFS.

Chapter 12, Accessing Network Storage with SMB

To use autofs and the command line to mount and unmount SMB file systems.

  • Mount, automount, and unmount SMB file systems.

Chapter 13, Controlling and Troubleshooting the Red Hat Enterprise Linux Boot Process

To troubleshoot the Red Hat Enterprise Linux boot process.

  • Describe the Red Hat Enterprise Linux boot process.

  • Repair common boot issues.

  • Repair file system issues at boot.

  • Repair boot loader problems.

Chapter 14, Limiting Network Communication with firewalld

To configure a basic firewall.

  • Configure a basic firewall using firewalld, firewall-config, and firewall-cmd.

References

Get information on more classes available from Red Hat at http://learn.spidernet.pl/training/

Revision: rh134-7-c643331