Training & Certifications

This course goes deeper into enterprise Linux administration including file systems and partitioning, logical volumes, SELinux, firewalling, and troubleshooting. Attending both Red Hat System Administration I and Red Hat System Administration II can help you in your preparation for the Red Hat Certified System Administrator exam (EX200).

At the end of the program, the participants will be able to :

  1. Understand and apply installation using Kickstart
  2. Manage filesystems and logical volumes
  3. Manage scheduled jobs
  4. Access network filesystems
  5. Manage SELinux
  6. Control firewalling
  7. Do and configure troubleshooting

This course is aimed at:

  • This course is singularly designed for students who have completed Red Hat System Administration I (RH124). The organization of topics is such that it is not appropriate for student to use RH134 as a curriculum entry point. Students who have not taken a previous Red Hat course are encouraged to take either System Administration I if they are new to Linux, or the RHCSA Fast Track course (RH200) if they are experienced with enterprise Linux administration.

  • This program is 4 days of intensive training class.

    Participants are required to have taken Red Hat System Administration I (RH124).

    At the end of the program, the participants will be assessed with Red Hat System Administrator II (RH134) Exam.

    Red Hat System Administrator II (RH134) Completion Certification will be awarded upon successfully passing the exam from Red Hat. This certification is a pathway towards getting RHCSA (Red Hat Certified System Administrator) Certification. RHCSA Certification is awarded after completion of Red Hat System Administrator I (RH124), Red Hat System Administrator II (RH134), and/or Red Hat System Administrator III (RH254).

    1. Automate the installation of Red Hat Enterprise Linux systems with Kickstart
    1. Write regular expressions that, when partnered with grep, will allow you to quickly isolate or locate content within text files
    1. Introduce the vim text editor, with which you can open, edit, and save text files
    1. Schedule tasks to automatically execute in the future
    1. Influence the relative priorities at which Linux processes run
      Manage file security using POSIX access control lists
    1. Manage the Security Enhanced Linux (SELinux) behavior of a system to keep it secure in case of a network service compromise
    1. Configure systems to use central identity management services
    1. Manage logical volumes from the command line
    1. Access (secure) NFS shares
    1. Use autofs and the command line to mount and unmount SMB file systems

    Scroll to Top