Video description
In this Red Hat Certified Systems Administrator Exam EX200 ( RHCSA ) training course, expert author Ric Messier will teach you everything you need to know to become a Red Hat Certified System Administrator (RHCSA) and pass the EX200 Exam. This course is designed for users that are familiar with Red Hat Enterprise Linux environments.
You will start by learning the fundamentals, such as basic shell commands, creating and modifying users, and changing passwords. Rick will then teach you about the shell, explaining how to manage files, use the stream editor, and locate files. This video tutorial will also cover system management, including booting and rebooting, network services, and installing packages. Other topics that are covered include storage management, server management, virtual machines, and security.
Once you have completed this computer based training course, you will be fully capable of taking the RHCSA EX200 exam and becoming a Red Hat Certified System Administrator.
Table of Contents
- Introduction
Welcome
00:03:18
About The Certification
00:03:06
What Will Be Covered
00:02:12
RHEL6 Vs RHEL7
00:03:19
- Getting Started
Getting RedHat
00:04:42
About Centos
00:03:47
System Requirements
00:02:51
Graphical Install Of RHEL
00:04:56
Finishing Installation
00:02:47
Text Install Of RHEL
00:05:03
- Getting Started And Fundamentals
Logging In And Starting A Terminal
00:05:23
Basic Shell Commands
00:05:50
User And Group Files
00:07:40
Creating Users
00:04:32
Modifying Users
00:03:34
Deleting Users
00:02:27
Password Policy
00:05:08
Changing Passwords
00:02:21
Creating Groups
00:02:51
Group Membership
00:02:29
Switching Users
00:03:58
Using Sudo
00:05:30
Getting Help
00:04:09
- Getting Familiar With The Shell
Redirection
00:02:58
Piping
00:04:00
Editing
00:03:19
Regular Expressions
00:04:12
Using The Stream Editor - SED
00:03:52
Using Grep
00:04:50
File Management
00:06:32
Directories
00:03:43
Permissions
00:05:05
Using Links
00:04:33
Archiving And Compressing
00:04:37
Other Utilities - Cut, Sort And Uniq
00:03:03
Shell History
00:04:38
Shell Tricks
00:05:16
Locating Files
00:05:03
Extending Ext4 Partitions
00:04:02
- System Management
Booting And Rebooting
00:04:41
Runlevels And Their Uses
00:03:33
Booting Into Different Runlevels
00:02:47
Single User Mode
00:04:29
Log Files
00:05:44
Syslog
00:04:26
Process Management
00:07:53
Network Services
00:04:59
Network Service Management
00:05:20
Network Service Management With Systemd
00:03:19
Network Service Management With Systemctl
00:03:45
Package Management
00:05:35
Deleting And Listing Packages
00:05:10
Package Details - Location And RPM
00:04:10
- Storage Management
Partitions
00:05:15
File Systems
00:03:35
Volume Management - Physical
00:03:57
Volume Management - Logical
00:02:38
Mounting Remote Volumes
00:03:14
Extending Logical Volumes
00:02:22
Using LUKS For Encryption
00:05:49
Using Setgid
00:04:45
Access Control Lists
00:03:52
Permissions Problems
00:03:39
Adding Partitions And Volumes
00:03:01
Using Swap Space
00:03:49
Booting A Disk Using UUID
00:04:35
- Server Management
Configuring Networking
00:04:05
Configuring DNS Resolution
00:03:54
Using Time Services
00:03:42
Using Cron To Setup Jobs
00:05:23
Installing HTTP
00:03:18
Installing FTP
00:03:47
Configuring Services
00:04:40
Setting Services To Run At Startup
00:04:10
Using LDAP Server For User Management
00:04:01
Updating Packages
00:03:35
RedHat Repositories
00:04:00
Using Kickstart To Deploy Systems
00:03:38
Manage And Update Kernel
00:04:40
Manage The Boot Loader
00:06:52
Manage The Boot Loader With Grub2
00:03:56
Connecting To Remote Systems Using SSH
00:04:22
Using Keys For Logging Into Systems Over SSH
00:03:48
Kernel Configuration Using Sysctl
00:03:09
- Virtual Machines
Preparing For Using Virtual Machines
00:03:02
Installing RHEL As A Virtual Guest
00:02:15
Launch Virtual Machines At Boot
00:02:19
Connecting To A Virtual Machine Console
00:02:17
- Security
IPtables
00:02:55
Creating Rules Using IPtables
00:04:11
Using System-Config-Firewall
00:03:20
SELinux
00:01:35
Configuring SELinux Mode - Permissive Versus Enforcing
00:02:42
File Contexts
00:03:14
Process Contexts
00:03:25
Restoring Default Contexts
00:01:56
SELinux Policy Violations
00:04:02
Using Boolean For SELinux Settings
00:03:30
Using Firewall
00:02:23
- Wrapping Up
Review
00:04:28
Next Steps
00:02:35