4  19 reviews on Udemy

Red Hat Certified System Administrator Prep Course

Red Hat Certified System Administrator Video Course
Course from Udemy
 104 students enrolled
 en
Red Hat Certified System Administrator (RHCSA) is an entry-level exam for the Linux administrators. The RHCSA training course includes real-life scenarios and thus will make you confident to solve the questions asked in the RHCSA exam.
  • This course curriculum follows the RHCSA  exam outline: 

  • 12+ hours Training Videos for all Exam Objectives


  • Introduction

  • Essential Tools

  • Access a shell prompt and issue commands

  • Use Input-Output Redirection

  • Use Input/Output Redirection - Part 2

  • Use Grep and Regular Expressions to Analyze Text

  • Access Remote System Using SSH

  • Log in and Switch Users in MultiUser Targets

  • Archive, Compress, Unpack and Uncompress Files Using tar, star, gzip and bzip2

  • Archive, Compress, Unpack and Uncompress Files Using tar, star, gzip and bzip2 - Part2

  • Create and Edit Text Files

  • Create, Delete, Copy and Move Files and Directories

  • Create Hard and Soft Links

  • List, Set and Change Standard UGO/RWX Permissionsm.

  • List, Set and Change Standard UGO/RWX Permissions - Part 2

  • List, Set and Change Standard UGO/RWX Permissions umask

  • Locate, Read and Use System Documentation with man, info and usr/share/doc

  • Finding Files with Locate and Find

  • Operate Running systems

  • Boot,Reboot and Shutdown a System

  • Boot system into different targets

  • Interrupt the Boot Process to Gain Access to the System

  • Adjust Process Priority and Kill Processes-Part1

  • Adjust Process Priority and Kill Processes-Part2

  • Adjust Process Priority and Kill Processes-Part3

  • Adjust Process Priority and Kill Processes-Part4

  • Locate and Interpret System Log Files and Journals

  • Start, Stop and Check the Status of Network Services

  • Securely Transfer Files Between Systems

  • Configure Local Storage

  • List, Create and Delete Partitions on MBR and GPT Disks

  • Using LVM

  • Configure Systems to Mount File Systems at Boot by UUID or Label

  • Add New Partitions and Logical Volumes and Swap to a System Non Destructively

  • Create and Configure File Systems

  • Create, Mount, Unmount and Use VFAT, EXT4 and XFS File Systems

  • Mount and Unmount CIFS and NFS Network File Systems

  • Extend Existing Logical Volumes

  • Create and Configure Set-GID Directories for Collaboration

  • Create and Manage Access Control Lists (ACLs) Part 01

  • Create and Manage Access Control Lists (ACLs) Part 02

  • Diagnose and Correct File Permission Problems

  • Deploy, Configure and Maintain Systems

  • Configure Networking and Hostname Resolution Statically or Dynamically :Troubles

  • Networking and Hostname Resolution Statically or Dynamically : Network Manager

  • Network /Hostname Resolution Statically or Dynamically : Hostname Configuration

  • Schedule Tasks Using at and cron

  • Schedule Tasks Using at and cron Part 2

  • Start and Stop Services and Configure Services to Start Automatically at Boot

  • Configure Systems to Boot into a Specific Target Automatically

  • Install Red Hat Enterprise Linux Automatically Using Kickstart

  • Configure a Physical Machine to Host Virtual Guests

  • Configure a System to Use Time Services

  • Install and Update Software Packages from Red Hat Network, YUM REPO

  • Install and Update Software Packages from Red Hat Network, RPM REPO

  • Managing Repositories

  • Configuring a Local Repository

  • Configuring a Local Repository Configure the GPG Key

  • Update the Kernel Package Appropriately to Ensure a Bootable System

  • Modifying the System Bootloader


  • Manage Users and Groups

  • Create, Delete & Modify Local User Accounts

  • Change Passwords & Adjust Password Aging for specific users

  • Create, Delete, and Modify Local Groups and Group Memberships

  • Using set-GID on Directories

  • Manage Security

  • Configure Firewall Settings Using Available Firewall Utilities

  • Configure Firewall Settings Using Available Firewall Utilities - Part2

  • Configure Key-Based Authentication for SSH

  • Introduction to SELinux

  • Set Enforcing and Permissive Modes for SELinux

  • List and Identify SELinux Files and Process Contexts

  • Restore Default File Contexts

  • Use Boolean Settings to Modify System SELinux Settings

  • UDiagnose and Address Routine SELinux Policy Violations

Red Hat Certified System Administrator Prep Course
$ 19.99
per course
Also check at

FAQs About "Red Hat Certified System Administrator Prep Course"

About

Elektev is on a mission to organize educational content on the Internet and make it easily accessible. Elektev provides users with online course details, reviews and prices on courses aggregated from multiple online education providers.
DISCLOSURE: This page may contain affiliate links, meaning when you click the links and make a purchase, we receive a commission.

SOCIAL NETWORK