Cert Prep: Red Hat Certified System Administrator (EX200)

Cert Prep: Red Hat Certified System Administrator (EX200)

English | MP4 | AVC 1280Ă—720 | AAC 48KHz 2ch | 6h 23m | 776 MB

Red Hat Enterprise Linux is one of the top enterprise Linux distributions—and Red Hat Certified System Administrator is one of the top Linux certifications. The RHCSA certification is required for many entry-level jobs and a prerequisite for all Red Hat higher-level exams. Use these study tips to earn your certification and become more proficient in Linux administration.

Instructor Grant McWilliams covers network and internet services administration, kernel management, and intrusion prevention. He shows how to make your systems more efficient with virtualization, manage users and groups, and lock everything down with SELinux mandatory access control. Plus, get access to 25 PDF “cheat sheets” and 100 practice questions so you can solidify and test your knowledge.

Topics include:

  • Installing Linux on a physical machine
  • Managing systemd services
  • Managing reoccurring jobs with cron
  • Limiting system access
  • Configuring networking
  • Creating, editing, and moving files and directories
  • Analyzing text with grep and regular expressions
  • Installing software and packages
  • Managing the kernel
  • Managing users, accounts, and groups
  • Setting permissions
  • Using access control lists
  • Securing Linux with SELinux
  • Accessing Linux remotely
  • Configuring local storage
Table of Contents

1 Welcome
2 What you should know
3 About Red Hat Certifications
4 Exercise files for this course
5 Create a bootable CentOS 7 live USB drive on Windows
6 Install Red Hat Enterprise Linux on a physical machine
7 Virtualization on Enterprise Linux
8 Prepare the host for virtualization
9 Install Linux interactively in a guest virtual machine (VM)
10 Use kickstart files to automate installs
11 Install Linux unattended in a guest VM
12 Configure VM virtual graphics cards and terminals
13 Configure VMs to communicate with each other
14 Managing virtual machines
15 Before you go further – VM checklist
16 Understand the Linux boot process
17 Boot into the emergency target
18 Introduction to systemd services
19 Get systemd service status
20 Manage systemd services
21 Make systemd services persistent
22 Configure networking
23 Configure a system to use network time protocol
24 Manage one-time jobs with at
25 Manage reoccurring user jobs with cron
26 Manage reoccurring system jobs with cron
27 Limiting access to at and cron
28 Use input-output redirection (_, __, _, 2_, and more)
29 Use grep and regular expressions to analyze text
30 Archive files using tar
31 Compress files and archives
32 Create files and directories
33 Copy files and directories
34 Move files and directories
35 Remove files and directories
36 Create hard and soft links
37 Introduction to vim
38 Editing text with vim
39 Locate, read, and use system documentation
40 Locate and interpret system log files
41 Reading the system journal
42 Install from a software repository
43 Linux repository management systems
44 Query with RPM
45 RPM query formatting
46 Overview of yum
47 Select yum packages by name
48 Get info on packages with yum
49 Get info on package groups
50 Search for packages
51 Install and remove packages
52 Install and remove package groups
53 Manage OS updates
54 Update the kernel
55 Manage kernel modules
56 Create and delete local user accounts
57 Modify local user accounts
58 Change passwords and adjust password aging for local user accounts
59 Manage aging for local user accounts
60 Create, delete, and modify local groups and group memberships
61 Log in and switch users in multiuser targets
62 Elevating privileges using sudo
63 File and directory modes
64 Change file and directory ownership
65 Set permissions using numeric mode
66 Set permissions using symbolic mode
67 Default permissions using umask
68 Special file bits – SUID and SGID
69 Special directory bits – SGID and sticky
70 Read access control lists
71 Set access control lists
72 Configure inheritance with default access control Lists
73 Delete access control Lists
74 Set enforcing and permissive modes for SELinux
75 List and identify SELinux file and process context
76 Restore SELinux default file contexts
77 Use Booleans to modify SELinux behavior
78 Diagnose routine SELinux policy violations
79 Maintaining security context when managing files
80 Manage firewalls
81 Configure Secure Shell
82 Configure key-based authentication for SSH
83 Securely transfer files between systems
84 Access Linux from Windows using PuTTY
85 Access Linux from MacOS or Linux using SSH
86 Access Linux from iOS using SSH
87 Access Linux from Android using SSH
88 List, create, and delete partitions on MBR and GPT disks
89 Manage LVM volumes and volume groups
90 Mount file systems at boot by ID or label
91 Extend existing logical volumes
92 Mount and unmount CIFS and NFS network file systems
93 Next steps