Red Hat Certified System Administrator (RHCSA)

The performance-based RHCSA (Red Hat Certified System Administrator) exam (EX200) tests your knowledge and skill in areas of system administration common across a wide range of environments and deployment scenarios. You must be an RHCSA to earn a Red Hat Certified Engineer (RHCE) certification. The skills tested in this exam are the foundation for system administration across all Red Hat products.

An RHCSA certification is earned when an IT professional demonstrates the core system-administration skills required in Red Hat Enterprise Linux environments.

Red Hat System Administration I

This course relates to Red Hat Enterprise Linux (RHEL) 7. Red Hat System Administration I (RH124) provides a foundation for students wishing to become full-time Linux system administrators by introducing key command line concepts and other enterprise-level tools. These concepts are further developed in the follow-on course, Red Hat System Administration II (RH134).

Audience

IT professionals across a broad range of disciplines who need to perform essential Linux administration tasks including installation, establishing network connectivity, managing physical storage, and basic security administration.

Prerequisites

There are no formal prerequisites for this course; however, previous operating system administration experience will be very beneficial.

Duration: 5 Days (40 hours)


Fee: Rs 8,500/- + service tax

Content Outline

  1. Access the command line: Log in to a Linux system and run simple commands using the shell.
  2. Manage files from the command line: Copy, move, create, delete, and organize files from the bash shell prompt.
  3. Get help in RHEL: Resolve problems by using online help systems and Red Hat support utilities.
  4. Create, view, and edit text files: Create, view, and edit text files from command output or in an editor.
  5. Manage local Linux users and groups: Manage local Linux users and groups, and administer local password policies.
  6. Control access to files with file system permissions: Set Linux file system permissions on files and interpret the security effects of different permission settings.
  7. Monitor and manage Linux processes: Obtain information about the system, and control processes running on it.
  8. Control services and daemons: Control and monitor network services and system daemons using systemd
  9. Configure and secure OpenSSH service: Access and provide access to the command line on remote systems securely using OpenSSH
  10. Analyze and store logs: Locate and accurately interpret relevant system log files for troubleshooting purposes.
  11. Manage RHEL networking: Configure basic IPv4 networking on Red Hat Enterprise Linux systems.
  12. Archive and copy files between systems: Archive files and copy them from one system to another.
  13. Install and update software packages: Download, install, update, and manage software packages from Red Hat and yum package repositories.
  14. Access Linux file systems: Access and inspect existing file systems on a Red Hat Enterprise Linux system.
  15. Use virtualized systems: Create and use Red Hat Enterprise Linux virtual machines with KVM and libvirt.
  16. Comprehensive review: Practice and demonstrate the knowledge and skills learned in this course.

Red Hat System Administration II

This course is specifically designed for students who have completed Red Hat System Administration I (RH124). Red Hat System Administration II (RH134) focuses on the key tasks needed to become a full time Linux administrator. This course goes deeper into enterprise Linux administration including file systems and partitioning, logical volumes, SELinux, firewalling, and troubleshooting. Attending both Red Hat System Administration I and Red Hat System Administration II can help you in your preparation for the Red Hat Certified System Administrator exam (EX200).

Audience

This course is singularly designed for students who have completed Red Hat System Administration I (RH124). The organization of topics is such that it is not appropriate for student to use RH134 as a curriculum entry point. Students who have not taken a previous Red Hat course are encouraged to take RH124 if they are new to Linux.

Prerequisites

Red Hat System Administration I (RH124) training

Duration: 4 Days (24 hours)


Fee: Rs 8,000/- + service tax

Content Outline

  1. Automate installation with Kickstart: Automate the installation of RHEL systems with Kickstart.
  2. Use regular expressions with grep: Write regular expressions that, when partnered with grep, will allow you to quickly isolate or locate content within text files.
  3. Create and Edit text files with vim: Introduce the vim text editor, with which you can open, edit, and save text files.
  4. Schedule future Linux tasks: Schedule tasks to automatically execute in the future.
  5. Manage priority of Linux processes: Influence the relative priorities at which Linux processes run.
  6. Control access to files with access control lists (ACL): Manage file security using POSIX access control lists.
  7. Manage SELinux security: Manage the Security Enhanced Linux (SELinux) behavior of a system to keep it secure in case of a network service compromise.
  8. Connect to network-defined users and groups: Configure systems to use central identity management services.
  9. Add disks, partitions, and file systems to a Linux system: Manage simple partitions and file systems.
  10. Manage logical volume management (LVM) storage: Manage logical volumes from the command line.
  11. Access networked attached storage with network file system (NFS): Access (secure) NFS shares.
  12. Access networked storage with SMB: Use autofs and the command line to mount and unmount SMB file systems.
  13. Control and troubleshoot the RHEL boot process
  14. Limit network communication with firewall: Configure a basic firewall.
  15. Comprehensive review: Practice and demonstrate knowledge and skills learned in this course.

RHCSA Certification Examination

This exam and the exam objectives provided here are based on the RHEL 7 version of the exam.

Exam Format

The RHCSA exam is a hands-on, practical exam that lasts 2.5 hours. Internet access is not provided during the exam. Outside materials are not permitted. Documentation that ships with Red Hat Enterprise Linux is available during the exam.

Recommended Preparation

The following training modules are offered to learn the required skills:

  • RH124: Red Hat System Administration I
  • RH134: Red Hat System Administration II

Audience

  • Experienced Red Hat Enterprise Linux system administrators seeking validation of their skills
  • Students who have attended Red Hat System Administration I and II and are on the path to earn RHCSA certification
  • Experienced Linux system administrators who require a certification either by their organization or based on a mandate (DOD 8570 directive)
  • IT professionals who are on the path to earn RHCE certification
  • An RHCE who is noncurrent or who is about to become noncurrent and wants to recertify as an RHCE

Duration: 2.5 Hours


Fee: Rs 12,500/- + service tax

Exam Objectives

The RHCSA exam objectives provides authoritative guidance on the knowledge and skills candidates will need to demonstrate in the RHCSA exam. It also provides more specific information on the exam format and coverage. All candidates are urged to use this information to evaluate their readiness for the exam:

Understand and use essential tools

  • Access a shell prompt and issue commands with correct syntax
  • Use input-output redirection (>, >>, |, 2>, etc.)
  • Use grep and regular expressions to analyze text
  • Access remote systems using ssh
  • Log in and switch users in multiuser targets
  • Archive, compress, unpack, and uncompress files using tar, star, gzip, and bzip2
  • Create and edit text files
  • Create, delete, copy, and move files and directories
  • Create hard and soft links
  • List, set, and change standard ugo/rwx permissions
  • Locate, read, and use system documentation including man, info, and files in /usr/share/doc

Operate running systems

  • Boot, reboot, and shut down a system normally
  • Boot systems into different targets manually
  • Interrupt the boot process in order to gain access to a system
  • Identify CPU/memory intensive processes, adjust process priority with renice, and kill processes
  • Locate and interpret system log files and journals
  • Access a virtual machine’s console
  • Start and stop virtual machines
  • Start, stop, and check the status of network services
  • Securely transfer files between systems

Configure local storage

  • List, create, delete partitions on MBR and GPT disks
  • Create and remove physical volumes, assign physical volumes to volume groups, and create and delete logical volumes
  • Configure systems to mount file systems at boot by Universally Unique ID (UUID) or label
  • Add new partitions and logical volumes, and swap to a system non-destructively

Create and configure file systems

  • Create, mount, unmount, and use vfat, ext4, and xfs file systems
  • Mount and unmount CIFS and NFS network file systems
  • Extend existing logical volumes
  • Create and configure set-GID directories for collaboration
  • Create and manage Access Control Lists (ACLs)
  • Diagnose and correct file permission problems

Deploy, configure, and maintain systems

  • Configure networking and hostname resolution statically or dynamically
  • Schedule tasks using at and cron
  • Start and stop services and configure services to start automatically at boot
  • Configure systems to boot into a specific target automatically
  • Install Red Hat Enterprise Linux automatically using Kickstart
  • Configure a physical machine to host virtual guests
  • Install Red Hat Enterprise Linux systems as virtual guests
  • Configure systems to launch virtual machines at boot
  • Configure network services to start automatically at boot
  • Configure a system to use time services
  • Install and update software packages from Red Hat Network, a remote repository, or from the local file system
  • Update the kernel package appropriately to ensure a bootable system
  • Modify the system bootloader

Manage users and groups

  • Create, delete, and modify local user accounts
  • Change passwords and adjust password aging for local user accounts
  • Create, delete, and modify local groups and group memberships
  • Configure a system to use an existing authentication service for user and group information

Manage security

  • Configure firewall settings using firewall-config, firewall-cmd, or iptables
  • Configure key-based authentication for SSH
  • Set enforcing and permissive modes for SELinux
  • List and identify SELinux file and process context
  • Restore default file contexts
  • Use boolean settings to modify system SELinux settings
  • Diagnose and address routine SELinux policy violations