Linux Academy Red Hat Certified Systems Administrator Prep
4.3 (26 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
376 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Linux Academy Red Hat Certified Systems Administrator Prep to your Wishlist.

Add to Wishlist

Linux Academy Red Hat Certified Systems Administrator Prep

Study for and pass the Red Hat Certified Systems Administrator exam
Best Seller
4.3 (26 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
376 students enrolled
Created by Linux Academy
Last updated 9/2017
English
Current price: $12 Original price: $80 Discount: 85% off
3 days left at this price!
30-Day Money-Back Guarantee
Includes:
  • 13 hours on-demand video
  • 5 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion

Training 5 or more people?

Get your team access to Udemy's top 2,000 courses anytime, anywhere.

Try Udemy for Business
What Will I Learn?
  • Pass the Red Hat Certified Systems Administrator exam.
View Curriculum
Requirements
  • There are required prerequisites for this prep course; however, previous operating system administration experience will be very helpful.
Description

This prep course designed by the Linux Academy takes the public objects for Red Hat's RHCSA 7 certification and puts you on the path to succeed the examination. At Linux Academy, we want to provide you with an in-depth understanding of managing a Red Hat system at an administrator level so that you can use your skills on real servers in the real world.   The Linux Academy is in no away affiliated with Red Hat, Inc, and this course is not provided or reviewed by Red Hat, Inc.

Who is the target audience?
  • This prep course designed by the Linux Academy takes the public objects for Red Hat's RHCSA 7 certification and puts you on the path to succeed the examination. At Linux Academy, we want to provide you with an in-depth understanding of managing a Red Hat system at an administrator level so that you can use your skills on real servers in the real world. The Linux Academy is in no away affiliated with Red Hat, Inc, and this course is not provided or reviewed by Red Hat, Inc.
Compare to Other Red Hat Courses
Curriculum For This Course
69 Lectures
12:45:45
+
Introduction
1 Lecture 07:31
+
Essential Tools
13 Lectures 03:25:52

Learn how to open the terminal from the Red Hat 7 Enterprise GUI interface, read man page syntax and ensure we are issuing commands with the proper syntax.

Preview 10:15

Learn about stdout, stderr, input/output redirection and other commands for manipulating command output.

Use Input/Output Redirection
17:57

Learn how to use the grep tool to filter through standard output and files to analyze and parse text.

Use grep and Regular Expressions to Analyze Text
16:09

Use SSH to connect to remote systems.

Access Remote Systems Using SSH
12:57

Learn about interactive shells, login shells and customization shell files.

Log in and Switch Users in Multiuser Targets
10:17

Use tar, star, gzip and bzip2 to work through examples demonstrating archiving files, file compression, and combining tar with compression programs for the management and packaging of files.

Archive, Compress, Unpack and Uncompress Files Using tar, star, gzip and bzip2
18:57

Learn how to use nano, vi and vim to create and edit text files on the command line.

Create and Edit Text Files
16:04

Learn how to move, copy and create files and directories on Red Hat Enterprise Linux 7.

Create, Delete, Copy and Move Files and Directories
12:08

Take a look at hard links and soft, or symbolic, links and the linking of files.

Create Hard and Soft Links
11:03

Learn about user permissions. We'll discuss special permission bits, octal permission setting, symbolic permissions and using commands such as newgrp, chown and chmod.

List, Set and Change Standard UGO/RWX Permissions
31:48

Learn about setting default permissions on files and directories using the umask command set persistent umask configurations.

List, Set and Change Standard UGO/RWX Permissions: umask
20:25

Find documentation for programs and utilities installed on the system. Learn how to use tools on the Linux system to read documentation.

Locate, Read and Use System Documentation with man, info and /usr/share/doc
16:55

Learn how to use the locate and find utilities to find files and directories on the system.

Finding Files with Locate and Find
10:57

Understand and use essential tools
6 questions
+
Operate Running Systems
12 Lectures 01:53:22

Learn how to boot, reboot and shutdown the Red Hat Enterprise 7 system. We'll review a little about systemd, targets and how they relate to these processes.

Boot, Reboot and Shutdown a System
10:31

Learn about systemd targets, how to use them to boot the system, and how to interrupt the system boot process to change what target the system should boot into. We'll also learn how to set default targets.

Boot Systems into Different Targets Manually
18:17

Learn how to interrupt the boot process to change the root password on a system. 

Interrupt the Boot Process to Gain Access to a System
09:05

Learn about pkill, pgrep and renice. Also learn how to boot a user from the system using these two tools.

Adjust Process Priority and Kill Processes - Part 1
12:20

Take a look at the ps and kill commands.

Adjust Process Priority and Kill Processes - Part 2
10:08

Learn how to use nice and renice to set process priority.

Adjust Process Priority and Kill Processes - Part 3
09:18

Learn to calculate load average using the top program.

Adjust Process Priority and Kill Processes - Part 4
13:09

Use journald, journalctl and the systemd logger to monitor your system. Take a look at rsyslog and regular log files on a Red Hat system.

Locate and Interpret System Log Files and Journals
14:34

Learn how to use the Red Hat GUI to access a virtual machine's console.

Access a Virtual Machine's Console
02:29

Use virsh and virt-manager to start and stop virtual machines.

Start and Stop Virtual Machines
02:43

Learn how to start, stop and check the status of network services.

Start, Stop and Check the Status of Network Services
04:04

Use the secure copy command and sftp to securely transfer files between systems.

Securely Transfer Files Between Systems
06:44

Operate running systems
21 questions
+
Configure Local Storage
4 Lectures 57:47

Learn how to create MBR- and GPT-based partitions. We cover how to create the partitions and mount those devices to the file system.

List, Create and Delete Partitions on MBR and GPT Disks
19:22

Learn how to use the LVM.  Create physical volumes, volume groups, and logical volumes, learn how each relates to another and remove volumes when necessary.

Using LVM
15:33

Use XFS and EXT file system tools to create labels on our new file systems. Learn how to use the UUID and label to create persistent mounts on a system.

Configure Systems to Mount File Systems at Boot by UUID or Label
11:35

Learn how to use LVM to create swap space on the system. We will also use a regular disk to attach swap space. As part of this lesson, we combine and use both the LVM volume and the regular disk to make our total amount of swap space.

Add New Partitions and Logical Volumes and Swap to a System Non-Destructively
11:17

Configure Local Storage
16 questions
+
Create and Configure File Systems
6 Lectures 01:15:04

Practice creating and deleting partitions. Each time, we will learn how to build a VFAT, EXT4, or XFS file system, mount it for persistence, learn how to find file system information and repair the system should any issues arise.

Create, Mount, Unmount and Use VFAT, EXT4 and XFS File Systems
14:58

Learn how to mount CIFS and NFS shares as persistent mounts on a client machine.

Mount and Unmount CIFS and NFS Network File Systems
11:17

Learn how to extend logical volumes, extend volume groups, move physical extents to other volume groups, reduce the size of volume groups and more.

Extend Existing Logical Volumes
13:59

Learn how to apply a set-GID special permission bit on directories. We will discuss how this enables collaboration and the different situations in which we might want to use it.

Create and Configure Set-GID Directories for Collaboration
07:39

Learn how to manage Access Control Lists on Red Hat systems.

Create and Manage Access Control Lists (ACLs)
23:18

Potential permission tools and settings to think about when it comes to diagnosing file permission issues.

Diagnose and Correct File Permission Problems
03:53

Create and configure file systems
6 questions
+
Deploy, Configure and Maintain Systems
19 Lectures 02:41:55

Tools that are used to help troubleshoot network connectivity on a Red Hat machine.

Configure Networking and Hostname Resolution Statically or Dynamically: Troubles
06:50

Learn how to configure network connections on multiple devices using the network control manager on Red Hat 7.

Networking and Hostname Resolution Statically or Dynamically: Network Manager
11:45

Learn about /etc/hosts, DNS, nameservers and network manager. We will also learn about hostnames and configuring persistent hostnames on a system.

Network/Hostname Resolution Statically or Dynamically: Hostname Configuration
10:34

Learn about the at, cron and anacron utilities. We'll learn how to schedule tasks with these tools.

Schedule Tasks Using at and cron
25:35

Learn how to enable services to start automatically at boot time. We will also look at several different methods used to determine if a service is enabled or disabled for a specific target.

Start and Stop Services and Configure Services to Start Automatically at Boot
07:53

Review how to configure the default targets for our system.

Configure Systems to Boot into a Specific Target Automatically
01:17

Take a look at how kickstart can be used to automatically deploy systems.

Install Red Hat Enterprise Linux Automatically Using Kickstart
14:23

Configure a Physical Machine to Host Virtual Guests
05:59

Install Red Hat Enterprise Linux Systems as Virtual Guests
09:06

Use the command line to configure a KVM virtual machine to start running when the physical host machine boots.

Configure Systems to Launch Virtual Machines at Boot
03:05

Configure network cards and network services to automatically start at boot time.

Configure Network Services to Start Automatically at Boot
02:10

Learn how to manage the system time and configure the chronyd service to work with NTP.

Configure a System to Use Time Services
15:43

Learn about yum basics, concept and practice.

Install and Update Software Packages from Red Hat Network, YUM REPO
11:21

Install and Update Software Packages from Red Hat Network, RPM REPO
07:36

Learn about yum repos. We will also learn how to configure the epel third-party repository.

Managing Repositories
08:22

Learn how to mount a DVD ISO of Red Hat 7 to create a local package repository on our machine.

Configuring a Local Repository
05:23

Learn how to download the GPG key from the epel repository and configure our repository to use the epel GPG key.

Configuring a Local Repository: Configure the GPG Key
05:42

Learn how to download the latest kernel RPM package from yum and update the kernel using RPM. Generally, in this situation, you would not have access to yum or you could just run yum update. However, to accomplish the objective, we can easily download the kernel RPM package from yum and continue in the lesson.

Update the Kernel Package Appropriately to Ensure a Bootable System
06:40

Learn how to modify the GRUB2 bootloader to change the default kernel that the system boots.

Modifying the System Bootloader
02:31

Deploy, configure, and maintain systems
18 questions
+
Manage users and groups
5 Lectures 01:05:43

In this lesson we are going to get started by creating, modifying, and deleting user accounts. We'll take a look at password and user configuration files on the system.

Create, Delete, and Modify Local User Accounts
18:30

In this lesson we are going to work with the passwd, chage, and usermod command in order to modify and enforce password policies for local user accounts.

Change Passwords and Adjust Password Aging for Local User Accounts
15:52

In this lesson we are going to cover creating groups, demonstrating permissions, and modifying group information.

Create, Delete, and Modify Local Groups and Group Memberships
14:22

In this lesson we are going to learn how and why we might want to use the set-GID on group directories when managing groups for local users.

Using set-GID On Directories
08:38

In this lesson we are going to learn how to use the realm utility in order to connect our Red Hat 7 server to a single sign on active directory server.

Configure a System to Use an Existing Authentication Service for User and Group
08:21

Manage Users And Groups
11 questions
+
Manage Security
8 Lectures 01:16:24

In this lesson we are going to learn about firewalld and how to configure firewall rules, sources, and zones using firewalld.

Configure Firewall Settings Using Available Firewall Utilities.
19:07

In this lesson we are going to learn how to create key-based authentication without passwords to remote servers. We will also learn how to issue remote commands using key based authentication!

Configure Key-Based Authentication for SSH
09:00

In this lesson we are going to have an overview of what SELinux is, what we need to use it, and a little about what we will cover in following videos as part of this section.

Introduction to SELinux
08:51

In this lesson, we are going to learn how to use setenforce and getenforce to modify SELinux modes. We will also learn how to make persistent mode changes for reboots.

Set Enforcing and Permissive Modes for SELinux
03:20

In this lesson, we are going to start working with context and labels for processes, files and directories.

List and Identify SELinux Files and Process Contexts
09:50

In this lesson we are going to learn how to create contexts for custom files, restore default contexts, and practice using the Apache web server.

Restore Default File Contexts
09:03

In this lesson we are going to learn how to use SELinux booleans and also set persistence for SELinux booleans.

Use Boolean Settings to Modify System SELinux Settings
11:54

In this lesson we are going to learn how to configure our system for monitoring and troubleshooting of SELinux policy violations.

Diagnose and Address Routine SELinux Policy Violations
05:19
+
Preparing For The Exam
1 Lecture 02:07
Best Practices to Remember While Taking the Exam
02:07

Finding help or documentation while in the exam
3 questions
About the Instructor
Linux Academy
4.6 Average rating
14,213 Reviews
80,216 Students
12 Courses
Instructor at Linux Academy

Linux Academy was founded on the belief that providing high-quality, in-depth training should be available at an affordable price. We strive to change lives by teaching Linux and cloud technology. Students can learn new skills, get certified, and advance in their career. 

Our full-time, expert instructors create content on AWS, Linux, OpenStack, DevOps, Azure, and Big Data.