Skip to main content

Red Hat Certified Engineer (RHCE) Prep Course

Course

Intro Video

Photo of Terrence Cox

Terrence Cox

Senior Vice President of Content

A veteran of twenty years in Information Technology in a variety of roles. He has worked in development, security and infrastructure well before they merged into what we now call DevOps. He provides training in Linux, VMWare, DevOps (Ansible, Jenkins, etc) as well as containers and AWS topics. He now leads the Training Architects to produce the courses and content we all know and love!

Length

28:27:04

Difficulty

Advanced

Videos

55

Hands-on Labs

7

Quizzes/Exams

1

Course Details

The Red Hat Certified Engineer course will prepare you for the certification exam from Red Hat. This certification is intended to be earned by a current Red Hat Certified System Administrator (RHCSA). This course will prepare you for the performance based certification exam by Red Hat that is intended to demonstrate your knowledge, skills and experience as a senior system administrator that is responsible for Red Hat Enterprise Linux systems.

Notice: This is not an official Red Hat course created by or approved by Red Hat. The Linux Academy is in no away affiliated with Red Hat, inc the company.

Addendum: Bash Scripting is one of the objectives for this certification, but is relatively minor. You should pick up enough knowledge as you work through the course to cover the requirements for the exam. Please see The System Administrator's Guide to Bash Scripting course for more detailed coverage of this topic: 

https://linuxacademy.com/cp/modules/view/id/72

Syllabus

Introduction to Red Hat Certified Engineer

Let's talk about the RHCE, how it differs from its little brother, walk through the course syllabus and then talk about registering and taking the exam.

Introduction to RHCE

00:07:20

Lesson Description:

Introduce the certification.

Course Syllabus

00:11:10

Lesson Description:

Talk about what domains and competencies we are going to cover.

Registering for the Exam

00:11:06

Lesson Description:

How do you register?Note: instead of examlocals, register for the exam through the RedHat website - https://www.redhat.com/en/services/certification/individual-exams

Taking the Exam

00:12:59

Lesson Description:

Thoughts and advice about taking the exam.

RHEL 8 Update Information

00:02:14

Lesson Description:

Red Hat recently announced RHEL 8. In this video we cover what this means to you as a Linux Academy student and RHEL consumer.

System configuration and management

Use Network Teaming or Bonding to Configure Aggregated Network Links Between Two Red Hat Enterprise Linux Systems or Interfaces

00:13:17

Lesson Description:

We are going to take a system with multiple interfaces and, using the Network Manager command line interface, bond them so they function as a single interface in Master/Slave failover mode.

Configure IPv6 Addresses and Perform Basic IPv6 Troubleshooting

00:08:04

Lesson Description:

Although not in wide use at this time, we will begin learning how to use IPv6 in our RHEL environment by configuring an adapter with a private IPv6 address and making sure it communicates as expected.

Route IP Traffic and Create Static Routes

00:12:38

Lesson Description:

Let's talk about both the legacy and modern methods of routing and displaying of our routing tables. We will then add a static route at the command line dynamically and explore how to create a static route that persists across reboots.

Use Firewalld and Associated Mechanisms Such as Rich Rules, Zones and Custom Rules, to Implement Packet Filtering and Configure Network Address Translation (NAT) - Part I

00:15:41

Lesson Description:

We will split this into two videos, this one will cover packet filtering and how to apply custom rules to zones.

Use Firewalld and Associated Mechanisms Such as Rich Rules, Zones and Custom Rules, to Implement Packet Filtering and Configure Network Address Translation (NAT) - Part II

00:18:35

Lesson Description:

Part II covers NAT/port forwarding as well as applying rich rules to zones for expanded abilities.

Use /proc/sys and sysctl to Modify and Set Kernel Runtime Parameters

00:13:38

Lesson Description:

Learn how to set the kernel parameters using the /proc/sys filesystem, the sysctl utility for dynamic changes and then the /etc/sysctl.conf file for persistent changes.

Configure a System to Authenticate Using Kerberos - KDC Server Setup

00:26:08

Lesson Description:

We will be setting up a KDC server for kerberos user authentication.

Configure a System to Authenticate Using Kerberos - Client Setup

00:09:30

Lesson Description:

In this video, we will set up our kerberos client to authenticate to our KDC server.

Configure a System as Either an iSCSI Target or Initiator That Persistently Mounts an iSCSI Target - Target Setup

00:14:19

Lesson Description:

Let's set up our iSCSI Target server with a block device for remote mounting.

Configure a System as Either an iSCSI Target or Initiator That Persistently Mounts an iSCSI Target - Initiator Setup

00:14:57

Lesson Description:

Now that the target is available, we need to configure our client to mount it persistently (after reboot).

Produce and Deliver Reports on System Utilization (Processor, Memory, Disk, and Network)

00:18:04

Lesson Description:

In this video, we will present both a real time and historical utility for generating CSV files that can be used to report on various system statistics. Note: Each line in a crontab represents a job.

* minute (0 - 59)
* * hour (0 - 23)
* * * day of the month (1 - 31)
* * * * month (1 - 12)
* * * * * day of the week (0 - 6) (Sunday to Saturday; 7 is also Sunday on some systems)
* * * * * command to execute

Exercise: Produce and Deliver Reports on System Utilization

00:30:00

Hands-on Labs are real live environments that put you in a real scenario to practice what you have learned without any other extra charge or account to manage.

Configure IPv6 Addresses

00:00:02

Hands-on Labs are real live environments that put you in a real scenario to practice what you have learned without any other extra charge or account to manage.

Route IP Traffic by Creating Static Routes

00:00:02

Hands-on Labs are real live environments that put you in a real scenario to practice what you have learned without any other extra charge or account to manage.

Use Network Teaming or Bonding to Configure Aggregated Network Links Between Two Red Hat Enterprise Linux Systems

00:00:02

Hands-on Labs are real live environments that put you in a real scenario to practice what you have learned without any other extra charge or account to manage.

Configure a System to Authenticate Using Kerberos

00:00:03

Hands-on Labs are real live environments that put you in a real scenario to practice what you have learned without any other extra charge or account to manage.

Configure an iSCSI Target and Initiator

00:00:03

System configuration and management

Network Services

Section Overview

00:03:41

Lesson Description:

Since we are going to apply most of these concepts as needed throughout the specific sections, let's talk a little about how they apply and explore them in general before we dive into the details.

Install the Packages Needed to Provide the Service

00:09:36

Lesson Description:

A quick refresher on how to install packages using the traditional YUM and RPM tools.

Configure SELinux to Support the Service

00:04:44

Lesson Description:

Here we will talk about SELinux in general and how it is used to support running services.

Use SELinux Port Labeling to Allow Services to Use Non-Standard Ports

00:07:39

Lesson Description:

Port labeling through SELinux helps to prevent rogue processes from binding to ports without the proper notification. Let's see how to query and set these values.

Configure the Service to Start When the System is Booted

00:06:46

Lesson Description:

Using systemd differs from previous versions using the older sysvinit system. Let's take a quick look at the ways we can work with our daemons and configure them to start on boot.

Configure the Service for Basic Operation

00:10:53

Lesson Description:

How do we take what we learned about systemd and our services and apply it to the services we need? PLEASE NOTE: The contents of "Configure Host Based and User Based Security for the Service" and "Configure the Service for Basic Operation" are the same. The topics are covered in ONE video, however, they are listed as several topics on Red Hat's exam requirements, so we are leaving the two topics in the list for anyone who may not be following the course in order.

Configure Host-Based and User-Based Security for the Service

00:13:05

Lesson Description:

In this video, we will talk about ways that we can secure various services by host and by user. Utilizing our firewall and the TCP Wrappers with the associated 'hosts.allow' and 'hosts.deny', we will explore two separate ways of restricting user and host access to our system services.

Exercise: Configure and Use SELinux to Support Services

00:30:00

Exercise: Configure a Service to Start When the System is Booted

00:30:00

HTTP/HTTPS

Install and Configure Apache

00:07:38

Lesson Description:

Let's install and get the service running for our basic Apache Server.

The Apache Configuration File - A Walk Through

00:12:54

Lesson Description:

Let's take a few minutes to understand the major sections and directives in the HTTPD.CONF Apache configuration file.

Configure Private Directories

00:19:52

Lesson Description:

We can enable user private directories, protecting them with a password.

Configure Group Managed Content

00:14:48

Lesson Description:

We can also protect directories and set them up for group collaboration.

Configure a Virtual Host

00:10:07

Lesson Description:

Let's learn how to set up and configure a site using a basic VHost configuration file.

Deploy a basic CGI application

00:13:01

Lesson Description:

Deploy a basic CGI script, configure your apache server to allow a non-default location for CGI scripts

Configure TLS Security - Generating Key Files, CSRs and Self Signed Certificates

00:12:49

Lesson Description:

As the title says

Configure TLS security - Configuring the Virtual Host

00:08:04

Lesson Description:

Configure our system to use our certificates. Note: add the private key to the private folder.

Exercise: Install and Configure Apache

00:30:00

Exercise: Configure a Virtual Host

00:30:00

DNS

Configure a Caching-Only Name Server

00:11:09

Lesson Description:

Configure the BIND service so that it functions as a DNS caching name server only (non authoritative for any domain or zone).

Troubleshoot DNS Client Issues

00:10:52

Lesson Description:

What tools, utilities and configuration files are involved on the client side - let's find out!

NFS

Provide Network Shares to Specific Clients - Server Installation and Configuration

00:13:13

Lesson Description:

Create NFS shares restricted to certain IPs - server install and configuration.

Provide Network Shares to Specific Clients - Client Installation and Configuration

00:09:16

Lesson Description:

Same as server, now its the client's turn!

Provide Network Shares Suitable for Group Collaboration

00:12:38

Lesson Description:

Use our NFS set up with SETGID and we have a collaboration share!

Use Kerberos to Control Access to NFS Network Shares - Quick NFS Setup

00:13:04

Lesson Description:

In preparation for our Kerberos activities, we have to have an NFS server and client set up. We will run through that in this video, preparing for use in our Kerberos environment.

Use Kerberos to Control Access to NFS Network Shares - Kerberos NFS Server and Client

00:15:23

Lesson Description:

Now that NFS is set up, let's add the appropriate principle configuration to our KDC server and protect our mount via Kerberos.

Exercise: Provide Network Shares to Specific Clients - Server Setup

00:30:00

Exercise: Provide Network Shares to Specific Clients - Client Setup

00:30:00

Hands-on Labs are real live environments that put you in a real scenario to practice what you have learned without any other extra charge or account to manage.

Use Kerberos to Control Access to NFS Shares

00:00:04

SMB

Provide Network Shares to Specific Clients - Server Installation and Configuration

00:13:53

Lesson Description:

Using Samba, share out some directories, install and configure the Samba service.

Provide Network Shares to Specific Clients - Client Installation and Configuration

00:08:32

Lesson Description:

Same as the server, now it's the client's turn!

Provide Network Shares Suitable for Group Collaboration

00:15:23

Lesson Description:

Now that we have our shares, lets make a couple changes and end up with a collaboration share!

SMTP

Configure a System to Forward All Email to a Central Mail Server - Setup

00:15:34

Lesson Description:

Installation and set up of Postfix email server as a mail forwarding agent.

Configure a System to Forward All Email to a Central Mail Server - Client Testing

00:06:33

Lesson Description:

Now that we have the server set up for forwarding, let's see how to test it and view the logs!

Hands-on Labs are real live environments that put you in a real scenario to practice what you have learned without any other extra charge or account to manage.

Configure a System to Forward All Email to a Central Mail Server

00:00:02

Exercise: Configure a System to Forward All Email to a Central Mail Server

00:30:00

SSH

Configure Key-Based Authentication

00:10:07

Lesson Description:

Configure SSH with keys and exchange them for secure, passwordless, authentication.

Configure Additional Options Described in Documentation

00:07:18

Lesson Description:

Make sure the install is done, service is enable and persistent, firewall is set up for allowing SSH, and exploring the configuration options in the sshd_config file.

Exercise: Configure Key-Based Authentication

00:30:00

NTP

Synchronize Time Using Other NTP Peers - Set Up Local Time Server

00:07:15

Lesson Description:

Before we can synchronize using a peer, we have to set something up to synchronize to!

Synchronize Time Using Other NTP Peers - Peer with New Time Server

00:06:33

Lesson Description:

Now we set up a peering between our server and client.

Database Services

Install and Configure MariaDB

00:11:03

Lesson Description:

We are going to explain the difference between MySQL and MariaDB and then run through an installation, service configuration and node configuration to get it up and running in a secure manner.

Install and Configure Local and Remote MariaDB Clients

00:08:31

Lesson Description:

Now we need a couple of clients to test, let's bind our server to accept external connections and then restrict it to local connections only.

Create a Simple Database Schema

00:10:04

Lesson Description:

Now that we have our instance installed and we can talk to it, let's create a database and add a basic schema to put our data into.

Perform Simple SQL Queries Against a Database

00:16:36

Lesson Description:

Let's learn the basics of SQL - Select, insert, delete, drop, describe, update

Backup and Restore a Database - Backups

00:10:04

Lesson Description:

We need to learn how to back up a single database, multiple databases and our entire DB server using 'mysqldump'.

Backup and Restore a Database - Restore

00:10:07

Lesson Description:

Now that we have a backup, let's look at the behavior of a restore based on them.

Exercise: Install and Configure MariaDB

00:30:00

Preparing For The Exam

How to Practice and Study After Completing the Course

00:12:59

Lesson Description:

Let's reiterate how best to prepare for our exam.

Summary and Next Steps

00:05:16

Lesson Description:

Now that we have our certification, where do we go from here on the Red Hat certification track?

Take this course and learn a new skill today.

Transform your learning with our all access plan.

Start 7-Day Free Trial