Abstract
| Overview | |
|---|---|
| Goal | To practice and demonstrate knowledge and skills learned in Red Hat System Administration II. |
| Objectives |
|
| Sections |
|
| Lab |
|
Review chapters to validate knowledge level.
Review practice exercises to validate skill level.
After completing this section, students should be able to demonstrate knowledge and skill of the topics covered in each chapter.
Before beginning the comprehensive review for this course, students should be comfortable with the topics covered in each chapter.
Students can refer to earlier sections in the textbook for extra study.
Chapter 1, Automating Installation with Kickstart
To automate the installation of Red Hat Enterprise Linux systems with Kickstart.
Explain Kickstart concepts and architecture.
Create a Kickstart configuration file.
Chapter 2, Using Regular Expressions with grep
To write regular expressions using grep to isolate or locate content in text files.
Create regular expressions to match text patterns.
Use grep to locate content in files.
Chapter 3, Creating and Editing Text Files with vim
Introduce the vim text editor.
Explain the three main modes of vim.
Open, edit, and save text files.
Use editor shortcuts.
Chapter 4, Scheduling Future Linux Tasks
Schedule tasks to automatically execute in the future.
Schedule one-time tasks with at.
Schedule recurring jobs with cron.
Schedule recurring system jobs.
Manage temporary files.
Chapter 5, Managing Priority of Linux Processes
To influence the relative priorities at which Linux processes run.
Describe nice levels.
Set nice levels on new and existing processes.
Chapter 6, Controlling Access to Files with Access Control Lists (ACLs)
To manage file security using POSIX access control lists (ACLs).
Describe POSIX access control lists.
Manage POSIX access control lists.
Chapter 7, Managing SELinux Security
To manage the Security Enhanced Linux (SELinux) behavior of a system to keep it secure in case of a network service compromise.
Explain the basics of SELinux permissions.
Change SELinux modes with setenforce.
Change file contexts with semanage and restorecon.
Manage SELinux booleans with setsebool.
Examine logs and use sealert to troubleshoot SELinux violations.
Chapter 8, Connecting to Network-defined Users and Groups
To configure systems to use central identity management services.
Use centralized identity management services.
Chapter 9, Adding Disks, Partitions, and File Systems to a Linux System
To create and manage disks, partitions, and file systems from the command line.
Manage simple partitions and file systems.
Manage swap space.
Chapter 10, Managing Logical Volume Management (LVM) Storage
To manage logical volumes from the command line.
Describe logical volume management components and concepts.
Manage logical volumes.
Extend logical volumes.
Chapter 11, Accessing Network Storage with Network File System (NFS)
To use autofs and the command line to mount and unmount network storage with NFS.
Mount, access, and unmount network storage with NFS.
Automount and access network storage with NFS.
Chapter 12, Accessing Network Storage with SMB
To use autofs and the command line to mount and unmount SMB file systems.
Mount, automount, and unmount SMB file systems.
Chapter 13, Controlling and Troubleshooting the Red Hat Enterprise Linux Boot Process
To troubleshoot the Red Hat Enterprise Linux boot process.
Describe the Red Hat Enterprise Linux boot process.
Repair common boot issues.
Repair file system issues at boot.
Repair boot loader problems.
Chapter 14, Limiting Network Communication with firewalld
To configure a basic firewall.
Configure a basic firewall using firewalld, firewall-config, and firewall-cmd.
Get information on more classes available from Red Hat at http://learn.spidernet.pl/training/