Following Topics will be covered in RHCSA Course.
INTRODUCTION TO OPERATING SYSTEMS:
Discussing Operating system families
Why LINUX?
Explaining levels of server technology
What is GNU/GPL licensing?
Introduction to Open source platform
Describe various flavor of Linux
Distinguish between Enterprise and Free Linux
Co-relation between Linux and Unix
INSTALLATION:
Discussing and explaining hardware and virtual platform for installation
Introduction to variants of REDHAT ENTERPRISE LINUX
Perform installation via GUI and CLI
Understanding mount points and partitioning system in Linux
Understanding package selection
Step-by-step installation
WORKING WITH LINUX COMMAND-LINE:
Understanding CLI,GUI and TUI mode of access
Accessing command-line terminals and x-terminals
Getting familiar with Linux Shell Prompt (BASH)
Performing User login , logout and live user status monitoring on CLI
Checking HOSTNAME, — USERNAME, WORKING DIRECTORY, KERNEL VERSION, UPTIME, DATE and CALENDER from
command-line
UNDERSTANDING LINUX FILE SYSTEM:
Understanding directory structure
Exploring various system directories
UNDERSTANDING BASIC TOOLS AND UTILITIES:
Text Editors
Using Vi and NANO editors on command-line
Using GEDIT and EMACS on GNOME terminal
Using GREP, SORT, SED, DIFF, LESS, MAN, INFO, –HELP
Using MKDIR, TOUCH, CAT, FILE, CP, MV, RM, RMDIR
Performing Standard Input/Output re-direction
SPECIAL FILES:
Configuring Symlinks
Understanding Orphaned links
Recovering Orphaned links
Performing file duplication using Hardlinks
FILE PERMISSIONS:
Understanding basic permissions
Understanding user categories
Understanding NUMERIC method of calculating permissions
Using chmod command to set file and directory permissions
Setting STICKY-BIT permission on directories
Assigning explicit permissions using File Access oCntrol List
FILE COMPRESSION:
Understanding compression/decompression process
Understand and use TAR archive manager
Use GZIP and BZIP2 for compression
Tune process nice value for BZIP2
— USER MANAGEMENT:
Creating user accounts
Setting/removing password
Storing user information
Configuring password policies
Understanding user database files
Creating groups
Adding users to a group
SHELL SCRIPTING:
Creating executable script
Creating backup scripts
Creating loop scripts
Understanding logic of ‘IF THEN’ scripting
Performing numeric calculation using ‘IF THEN’ logic
Using ‘ELIF’
Understanding logic of ‘CASE’ scripting
Creating multiple input script using ‘CASE’ script
Creating ‘FOR LOOP’ scripts
Use of ‘DO DONE’ and ‘DO WHILE’ in FOR LOOP
SERVICES AND PROCESSES:
What is a service?
Understanding types of service
Managing service in run-time
Managing service at start-up
Understanding processes
Managing and monitoring processes
Using RUN-LEVELS
BOOT PROCESS:
Working of BIOS program
Understanding use of boot files
Understanding kernel load process
Understanding complete system initialization
PACKAGE MANAGEMENT:
Discussing RPM and SOURCE-CODE methods for installation
Performing package installation, removal and up gradation using RPM
Performing package installation, removal and up gradation using YUM
Downloading and installing software via source-code
Configuring YUM server
Performing network installation and up gradation vis YUM server
DISK AND STORAGE MANAGEMENT:
Identifying device drivers
Mounting Optical and USB media
Creating Partitions
Perform memory monitoring using free command
Configuring and managing SWAP in run-time
Understanding Logical Volume Management
Creating Physical Volumes
Forming Volume Groups
Creating and assigning Logical Volumes to users
Understanding types of RAID
Understanding RAID levels – 0,1,5
Using ‘MDADM’ utility to perform software RAID
Understanding Disk Quota management
Setting user specific disk quota limits
Monitoring quota limits
VIRTUALIZATION:
Installing KVM
Installing QEMU server
Creating virtual machine
Accessing VMs via VNC VIEWER
Performing kick-start installation
NETWORKING BASICS:
Understanding IP addressing
Understanding OSI Model
Understanding protocols, ports and sockets
Understanding TCP and UDP communication
DHCP SERVER:
Installing DHCP Server
Managing DHCPd
Configuring DHCP server
Configuring Clients
Monitoring lease logs
FTP SERVER:
Understanding FTP and its ports
Installing FTP server
Configuring Anonymous FTP server
Accessing and downloading data from client node
Configuring Real FTP server
Jailing users to their home directories
Performing bandwidth management
Generating and monitoring FTP logs
Understanding and configuring TCP WRAPPERS
SAMBA/CIFS SERVER:
Understanding SAMBA service
Integrating SAMBA with WINDOWS
Creating workspace
Configuring shares
Deploying SAMBA server
Accessing from windows client
User and IP security
WEB SERVER:
Web service as backbone of internet
Understanding web hosting
Installing Apache web server
Creating and configuring web site
Hosting web site
Performing name based hosting
Creating password protected sites
NETWORK FILE SERVICE:
Understanding network file services
Configuring work space
Understanding RPC processes
Configuring NFS and RPC bind
Mounting exports on client computers
DNS SERVER:
Understanding name servers
Name servers versus Domain name servers
Understanding FQDN
Configuring zones
Assigning DNS to clients
Testing DNS with NSLOOKUP and DIG
Creating REVERSE LOOKUP
REMOTE SERVICES:
Configuring TELNET server
Configuring XINETD daemon
Perform telnet from client node
Understanding use of SSH
Configuring RSA passphrase
Performing secure login
Performing SCP and SFTP
LDAP and NIS AUTHENTICATION:
Understanding LDAP server
Configuring LDAP client authentication
Understanding NIS server roles
Authenticating client with NIS server
POSTFIX MAIL SERVICE:
Understanding traditional mail service
Discussing E-mail service
Configuring POSTFIX mail server
Integrating with DNS and creating MX records
Testing mail server via telnet
Creating users
Using client tools to send and receive mail
iSCSI STORAGE:
Understanding STORAGE AREA NETWORK
Discussing iSCSI and FCOE Technologies
Understanding iSCSI Target roles
Creating storage blocks
Configuring iSCSI target server
Using iSCSI Initiator on client
Making storage available permanently
SYSLOG SERVER:
Configuring SYSLOG server
Monitoring syslog
MARIA DB SERVICE:
Understanding database administration
Configuring MARIA DB service
Accessing database records
IPTABLES FIREWALL:
Understanding firewall roles
Installing IPTABLES firewall
Writing INPUT and OUTPUT rules in IPTABLES
Creating port based policies
Removing rules and flushing tables
CONFIGURING IPv6:
Understanding need of IPv6 addresses
Understanding Link-local address
Configuring IPv6 address
Pinging two computers with IPv6 address
SELINUX :
Enabling and disabling SELINUX
Modifying SELINUX policies
TROUBLESHOOTING:
Using SINGLE — USER MODE
Using RESCUE MODE
Identifying and resolving errors with networking