Red Hat Certified Systems Administrator – RHCSA (EX200) Exam Prep
This prep course designed by the Linux Academy takes the public objects for Red Hat's RHCSA 7 certification and puts you on the path to succeed the examination. At Linux Academy, we want to provide you with an in-depth understanding of managing a Red Hat system at an administrator level so that you can use your skills on real servers in the real world. The Linux Academy is in no away affiliated with Red Hat, Inc, and this course is not provided or reviewed by Red Hat, Inc.
About This Course and How to Prepare
Learn about this course, course requirement and how to use this course to prepare for the Red Hat RHCA exam.
Lab Servers and Following Along
Learn how to connect to the LinuxAcademy.com lab servers and GUI interfaces for Red Hat 7 to better follow along with the course videos. NOTE: Check out your new options to connect at: https://support.linuxacademy.com/hc/en-us/articles/360019096651-Cloud-Playground-FAQ
Access a Shell Prompt and Issue Commands
Learn how to open the terminal from the Red Hat 7 Enterprise GUI interface, read man page syntax and ensure we are issuing commands with the proper syntax.
Use Input/Output Redirection
Learn about stdout, stderr, input/output redirection and other commands for manipulating command output. NOTE: Use /home/cloud_user instead of /home/user The /etc/motd file will be empty upon completing this lesson
Use grep and Regular Expressions to Analyze Text
Learn how to use the grep tool to filter through standard output and files to analyze and parse text.
Access Remote Systems Using SSH
Use SSH to connect to remote systems. UPDATE: Check out the NEW Cloud Playground! https://support.linuxacademy.com/hc/en-us/articles/360019096651-Cloud-Playground-FAQ https://support.linuxacademy.com/hc/en-us/articles/360018147031-Create-a-New-Cloud-Playground-Server
Log in and Switch Users in Multiuser Targets
Learn about interactive shells, login shells and customization shell files.
Archive, Compress, Unpack and Uncompress Files Using tar, star, gzip and bzip2
Use tar, star, gzip and bzip2 to work through examples demonstrating archiving files, file compression, and combining tar with compression programs for the management and packaging of files. NOTE: bzip2 can compress multiple individual files without deleting with the original files: bzip2 -k MyFile1.txt MyFile2.txt MyFile3.txt To uncompress a file with bzip2: bzip2 -d MyFile1.txt.bz2
Create and Edit Text Files
Learn how to use nano, vi and vim to create and edit text files on the command line.
Create, Delete, Copy and Move Files and Directories
Learn how to move, copy and create files and directories on Red Hat Enterprise Linux 7.
Create Hard and Soft Links
Take a look at hard links and soft, or symbolic, links and the linking of files.
List, Set and Change Standard UGO/RWX Permissions
Learn about user permissions. We'll discuss special permission bits, octal permission setting, symbolic permissions and using commands such as newgrp, chown and chmod.
List, Set and Change Standard UGO/RWX Permissions: umask
Learn about setting default permissions on files and directories using the umask command set persistent umask configurations.
Locate, Read and Use System Documentation with man, info and /usr/share/doc
Find documentation for programs and utilities installed on the system. Learn how to use tools on the Linux system to read documentation.
Finding Files with Locate and Find
Learn how to use the locate and find utilities to find files and directories on the system.
Understand and use essential tools
Exercise: Understanding umask
Exercise: Archiving and Compressing Files
Exercise: Finding Files with locate and find
Operate Running Systems
Boot, Reboot and Shutdown a System
Learn how to boot, reboot and shutdown the Red Hat Enterprise 7 system. We'll review a little about systemd, targets and how they relate to these processes.
Boot Systems into Different Targets Manually
Learn about systemd targets, how to use them to boot the system, and how to interrupt the system boot process to change what target the system should boot into. We'll also learn how to set default targets.
Interrupt the Boot Process to Gain Access to a System
Learn how to interrupt the boot process to change the root password on a system.
Identify CPU/Memory Intensive Processes, Adjust Process Priority and Kill Processes - Part 1
Learn about pkill and pgrep. Also learn how to boot a user from the system using these two tools.
Identify CPU/Memory Intensive Processes, Adjust Process Priority and Kill Processes - Part 2
Take a look at the ps and kill commands.
Identify CPU/Memory Intensive Processes, Adjust Process Priority and Kill Processes - Part 3
Learn how to use nice and renice to set process priority.
Identify CPU/Memory Intensive Processes, Adjust Process Priority and Kill Processes - Part 4
Learn to calculate load average using the top program.
Locate and Interpret System Log Files and Journals
Use journald, journalctl and the systemd logger to monitor your system. Take a look at rsyslog and regular log files on a Red Hat system.
Access a Virtual Machine's Console
Learn how to use the Red Hat GUI to access a virtual machine's console.
Start and Stop Virtual Machines
Use virsh and virt-manager to start and stop virtual machines.
Start, Stop and Check the Status of Network Services
Learn how to start, stop and check the status of network services.
Securely Transfer Files Between Systems
Use the secure copy command and sftp to securely transfer files between systems.
Operate running systems
Exercise: Working with Systemd and Targets
Exercise: Recovering the Root Password
Exercise: Interrupting the Boot Process to Change the Boot Target
Exercise: Powering Off Systems
Exercise: Pgrep, pkill, kill and jobs
Exercise: Nice, renice and ps
Exercise: Monitoring and Calculating CPU Load Averages
Exercise: Working with top
Kill or Adjust Process Priorities
Configure Local Storage
List, Create and Delete Partitions on MBR and GPT Disks
Learn how to create MBR- and GPT-based partitions. We cover how to create the partitions and mount those devices to the file system. UPDATE: to add a partition with the Cloud Playground, click on the active server >> Actions >> Add /dev/xvdb. Attention: Device and partition names are different on the new playground servers compared to the cloud servers that were used when recording the videos.
Create and Remove Physical Volumes, Assign Physical Volumes to Volume Groups and Create and Delete Logical Volumes
Learn how to use the LVM. Create physical volumes, volume groups, and logical volumes, learn how each relates to another and remove volumes when necessary.
Configure Systems to Mount File Systems at Boot by UUID or Label
Use XFS and EXT file system tools to create labels on our new file systems. Learn how to use the UUID and label to create persistent mounts on a system.
Add New Partitions and Logical Volumes and Swap to a System Non-Destructively
Learn how to use LVM to create swap space on the system. We will also use a regular disk to attach swap space. As part of this lesson, we combine and use both the LVM volume and the regular disk to make our total amount of swap space.
Configure local storage
Add and Remove Volumes, Partition Disks, and Work with LVM
Exercise: Working with MBR Partitions
Exercise: Working with GPT Partitions
Exercise: Creating Persistent Mounts with File System Labels
Exercise: Creating Swap Space
Exercise: Creating Swap Space from a LVM Volume
Create and Configure File Systems
Create, Mount, Unmount and Use VFAT, EXT4 and XFS File Systems
Practice creating and deleting partitions. Each time, we will learn how to build a VFAT, EXT4, or XFS file system, mount it for persistence, learn how to find file system information and repair the system should any issues arise.
Extend Existing Logical Volumes
Learn how to extend logical volumes, extend volume groups, move physical extents to other volume groups, reduce the size of volume groups and more.
Create and Configure Set-GID Directories for Collaboration
Learn how to apply a set-GID special permission bit on directories. We will discuss how this enables collaboration and the different situations in which we might want to use it.
Create and Manage Access Control Lists (ACLs)
Learn how to manage Access Control Lists on Red Hat systems.
Diagnose and Correct File Permission Problems
Potential permission tools and settings to think about when it comes to diagnosing file permission issues.
Create and configure file systems
Exercise: Filesystem ACLs
Create and Mount SAMBA and CIFS Fileshares
Deploy, Configure and Maintain Systems
Configure Networking and Hostname Resolution Statically or Dynamically: Troubleshooting
Tools that are used to help troubleshoot network connectivity on a Red Hat machine. NOTE: We have updated the labs in the this course. Please use the Network Manager Sandbox lab instead of the one mentioned in the lecture.
Configure Networking and Hostname Resolution Statically or Dynamically: Network Manager
Learn how to configure network connections on multiple devices using the network control manager on Red Hat 7. Correction: The lab "Working with network control manager" is currently unavailable.
Configure Networking and Hostname Resolution Statically or Dynamically: Hostname Configuration
Learn about /etc/hosts, DNS, nameservers,and network manager. We will also learn about hostnames and configuring persistent hostnames on a system.
Schedule Tasks Using at and cron
Learn about the at, cron and anacron utilities. We'll learn how to schedule tasks with these tools.
Start and Stop Services and Configure Services to Start Automatically at Boot
Learn how to enable services to start automatically at boot time. We will also look at several different methods used to determine if a service is enabled or disabled for a specific target.
Configure Systems to Boot into a Specific Target Automatically
Review how to configure the default targets for our system.
Install Red Hat Enterprise Linux Automatically Using Kickstart
Take a look at how kickstart can be used to automatically deploy systems.
Configure a Physical Machine to Host Virtual Guests
Learn how to configure a machine to host virtual guests. We will install packages and walk through different tools to configure a machine for virtual guests.
Install Red Hat Enterprise Linux Systems as Virtual Guests
Use KVM to deploy a Red Hat 7 VM on our physical machine.
Configure Systems to Launch Virtual Machines at Boot
Use the command line to configure a KVM virtual machine to start running when the physical host machine boots.
Configure Network Services to Start Automatically at Boot
Configure network cards and network services to automatically start at boot time.
Configure a System to Use Time Services
Learn how to manage the system time and configure the chronyd service to work with NTP.
Install and Update Software Packages from Red Hat Network, a Remote Repository or the Local File System: YUM
Learn about yum basics, concept and practice.
Install and Update Software Packages from Red Hat Network, a Remote Repository or the Local File System: RPM
Learn how to use yumdownloader to download RPM packages from yum repositories and use the RPM package manager to install RPM packages, query package details and find related documentation.
Install and Update Software Packages from Red Hat Network, a Remote Repository or the Local File System: Managing Repositories
Learn about yum repos. We will also learn how to configure the epel third-party repository on our Red Hat Linux Academy lab server.
Install and Update Software Packages from Red Hat Network, a Remote Repository or the Local File System: Configuring a Local Repository
Learn how to mount a DVD ISO of Red Hat 7 to create a local package repository on our machine.
Install and Update Software Packages from Red Hat Network, a Remote Repository or the Local File System: Configuring a Local Repository: Configure the GPG Key
Learn how to download the GPG key from the epel repository and configure our repository to use the epel GPG key.
Update the Kernel Package Appropriately to Ensure a Bootable System
Learn how to download the latest kernel RPM package from yum and update the kernel using RPM. Generally, in this situation, you would not have access to yum or you could just run yum update. However, to accomplish the objective, we can easily download the kernel RPM package from yum and continue in the lesson.
Modifying the System Bootloader
Learn how to modify the GRUB2 bootloader to change the default kernel that the system boots.
Deploy, configure, and maintain systems
Exercise: Scheduling Tasks on Red Hat Systems
Exercise: Virtual Machines
Exercise: Working with Time Services
Exercise: Working with Yum
Exercise: Working with Yum Groups
Exercise: Working with RPM
Exercise: Managing Third Party Repositories
Exercise: Creating a Local Repository
Initializing Network Connectivity
Manage users and groups
Create, Delete, and Modify Local User Accounts
In this lesson we are going to get started by creating, modifying, and deleting user accounts. We'll take a look at password and user configuration files on the system.
Change Passwords and Adjust Password Aging for Local User Accounts
In this lesson we are going to work with the passwd, chage, and usermod command in order to modify and enforce password policies for local user accounts.
Create, Delete, and Modify Local Groups and Group Memberships
In this lesson we are going to cover creating groups, demonstrating permissions, and modifying group information.
Using set-GID On Directories
In this lesson we are going to learn how and why we might want to use the set-GID on group directories when managing groups for local users.
Configure a System to Use an Existing Authentication Service for User and Group Information: Using Realmd
In this lesson we are going to learn how to use the realm utility in order to connect our Red Hat 7 server to a single sign on active directory server. Update: the lab name has been changed to Using an Existing Authentication Service.
User Groups and Accounts Tasks
Using an Existing Authentication Service
Manage Users And Groups
Exercise: Managing Users and Groups
Configure Firewall Settings Using firewall-config, firewall-cmd, or iptables
In this lesson we are going to learn about firewalld and how to configure firewall rules, sources, and zones using firewalld.
Configure Key-Based Authentication for SSH
In this lesson we are going to learn how to create key-based authentication without passwords to remote servers. We will also learn how to issue remote commands using key based authentication!
Introduction to SELinux
In this lesson we are going to have an overview of what SELinux is, what we need to use it, and a little about what we will cover in following videos as part of this section.
Set enforcing and permissive modes for SELinux
In this lesson, we are going to learn how to use setenforce and getenforce to modify SELinux modes. We will also learn how to make persistent mode changes for reboots.
List and identify SELinux file and process context
In this lesson, we are going to start working with context and labels for processes, files and directories.
Restore Default File Contexts
In this lesson we are going to learn how to create contexts for custom files, restore default contexts, and practice using the Apache web server.
Use Boolean Settings to Modify System SELinux Settings
In this lesson we are going to learn how to use SELinux booleans and also set persistence for SELinux booleans.
Diagnose and Address Routine SELinux Policy Violations
In this lesson we are going to learn how to configure our system for monitoring and troubleshooting of SELinux policy violations.
Regaining Access to a System
Configure SELinux and Add - Restore Security Contexts
Accessing Systems and Working With Files
Exercise: Configure key-based authentication for SSH
Exercise: Working With SELinux Context, Booleans, and Troubleshooting
Preparing For The Exam
How to Practice and Study After Completing the Course
In this lesson we are going to talk about how to prepare for the exam after you have completed the LinuxAcademy.com RHCSA training course.
Best Practices to Remember While Taking the Exam
In this lesson we are going to talk about best practices for taking the RHCSA exam.
Final Tips For Taking The Exam
A few extra tips for taking the RHCSA Exam.
Finding help or documentation while in the exam