This prep course designed by the Linux Academy takes the public objects for Red Hat's RHCSA 7 certification and puts you on the path to succeed the examination. At Linux Academy, we want to provide you with an in-depth understanding of managing a Red Hat system at an administrator level so that you can use your skills on real servers in the real world. The Linux Academy is in no away affiliated with Red Hat, Inc, and this course is not provided or reviewed by Red Hat, Inc.
Learn how to open the terminal from the Red Hat 7 Enterprise GUI interface, read man page syntax and ensure we are issuing commands with the proper syntax.
Learn about stdout, stderr, input/output redirection and other commands for manipulating command output.
Learn how to use the grep tool to filter through standard output and files to analyze and parse text.
Use SSH to connect to remote systems.
Learn about interactive shells, login shells and customization shell files.
Use tar, star, gzip and bzip2 to work through examples demonstrating archiving files, file compression, and combining tar with compression programs for the management and packaging of files.
Learn how to use nano, vi and vim to create and edit text files on the command line.
Learn how to move, copy and create files and directories on Red Hat Enterprise Linux 7.
Take a look at hard links and soft, or symbolic, links and the linking of files.
Learn about user permissions. We'll discuss special permission bits, octal permission setting, symbolic permissions and using commands such as newgrp, chown and chmod.
Learn about setting default permissions on files and directories using the umask command set persistent umask configurations.
Find documentation for programs and utilities installed on the system. Learn how to use tools on the Linux system to read documentation.
Learn how to use the locate and find utilities to find files and directories on the system.
Learn how to boot, reboot and shutdown the Red Hat Enterprise 7 system. We'll review a little about systemd, targets and how they relate to these processes.
Learn about systemd targets, how to use them to boot the system, and how to interrupt the system boot process to change what target the system should boot into. We'll also learn how to set default targets.
Learn how to interrupt the boot process to change the root password on a system.
Learn about pkill, pgrep and renice. Also learn how to boot a user from the system using these two tools.
Take a look at the ps and kill commands.
Learn how to use nice and renice to set process priority.
Learn to calculate load average using the top program.
Use journald, journalctl and the systemd logger to monitor your system. Take a look at rsyslog and regular log files on a Red Hat system.
Learn how to use the Red Hat GUI to access a virtual machine's console.
Use virsh and virt-manager to start and stop virtual machines.
Learn how to start, stop and check the status of network services.
Use the secure copy command and sftp to securely transfer files between systems.
Learn how to create MBR- and GPT-based partitions. We cover how to create the partitions and mount those devices to the file system.
Learn how to use the LVM. Create physical volumes, volume groups, and logical volumes, learn how each relates to another and remove volumes when necessary.
Use XFS and EXT file system tools to create labels on our new file systems. Learn how to use the UUID and label to create persistent mounts on a system.
Learn how to use LVM to create swap space on the system. We will also use a regular disk to attach swap space. As part of this lesson, we combine and use both the LVM volume and the regular disk to make our total amount of swap space.
Practice creating and deleting partitions. Each time, we will learn how to build a VFAT, EXT4, or XFS file system, mount it for persistence, learn how to find file system information and repair the system should any issues arise.
Learn how to mount CIFS and NFS shares as persistent mounts on a client machine.
Learn how to extend logical volumes, extend volume groups, move physical extents to other volume groups, reduce the size of volume groups and more.
Learn how to apply a set-GID special permission bit on directories. We will discuss how this enables collaboration and the different situations in which we might want to use it.
Learn how to manage Access Control Lists on Red Hat systems.
Potential permission tools and settings to think about when it comes to diagnosing file permission issues.
Tools that are used to help troubleshoot network connectivity on a Red Hat machine.
Learn how to configure network connections on multiple devices using the network control manager on Red Hat 7.
Learn about /etc/hosts, DNS, nameservers and network manager. We will also learn about hostnames and configuring persistent hostnames on a system.
Learn about the at, cron and anacron utilities. We'll learn how to schedule tasks with these tools.
Learn how to enable services to start automatically at boot time. We will also look at several different methods used to determine if a service is enabled or disabled for a specific target.
Review how to configure the default targets for our system.
Take a look at how kickstart can be used to automatically deploy systems.
Use the command line to configure a KVM virtual machine to start running when the physical host machine boots.
Configure network cards and network services to automatically start at boot time.
Learn how to manage the system time and configure the chronyd service to work with NTP.
Learn about yum basics, concept and practice.
Learn about yum repos. We will also learn how to configure the epel third-party repository.
Learn how to mount a DVD ISO of Red Hat 7 to create a local package repository on our machine.
Learn how to download the GPG key from the epel repository and configure our repository to use the epel GPG key.
Learn how to download the latest kernel RPM package from yum and update the kernel using RPM. Generally, in this situation, you would not have access to yum or you could just run yum update. However, to accomplish the objective, we can easily download the kernel RPM package from yum and continue in the lesson.
Learn how to modify the GRUB2 bootloader to change the default kernel that the system boots.
In this lesson we are going to get started by creating, modifying, and deleting user accounts. We'll take a look at password and user configuration files on the system.
In this lesson we are going to work with the passwd, chage, and usermod command in order to modify and enforce password policies for local user accounts.
In this lesson we are going to cover creating groups, demonstrating permissions, and modifying group information.
In this lesson we are going to learn how and why we might want to use the set-GID on group directories when managing groups for local users.
In this lesson we are going to learn how to use the realm utility in order to connect our Red Hat 7 server to a single sign on active directory server.
In this lesson we are going to learn about firewalld and how to configure firewall rules, sources, and zones using firewalld.
In this lesson we are going to learn how to create key-based authentication without passwords to remote servers. We will also learn how to issue remote commands using key based authentication!
In this lesson we are going to have an overview of what SELinux is, what we need to use it, and a little about what we will cover in following videos as part of this section.
In this lesson, we are going to learn how to use setenforce and getenforce to modify SELinux modes. We will also learn how to make persistent mode changes for reboots.
In this lesson, we are going to start working with context and labels for processes, files and directories.
In this lesson we are going to learn how to create contexts for custom files, restore default contexts, and practice using the Apache web server.
In this lesson we are going to learn how to use SELinux booleans and also set persistence for SELinux booleans.
In this lesson we are going to learn how to configure our system for monitoring and troubleshooting of SELinux policy violations.
Linux Academy was founded on the belief that providing high-quality, in-depth training should be available at an affordable price. We strive to change lives by teaching Linux and cloud technology. Students can learn new skills, get certified, and advance in their career.
Our full-time, expert instructors create content on AWS, Linux, OpenStack, DevOps, Azure, and Big Data.