Skocz do zawartości

Aktywacja nowych użytkowników
Zakazane produkcje

  • advertisement_alt
  • advertisement_alt
  • advertisement_alt
oaxino

Linux Academy - Red Hat Certified Systems Administrator Prep Course.

Rekomendowane odpowiedzi

s.jpg

 

Linux Academy - Red Hat Certified Systems Administrator Prep Course

English | Size: 2.66 GB

Category: CBTs

Linux Academy Red Hat Certified Systems Administrator Prep Course

This prep course designed by the Linux Academy takes the public objects for Red Hat's RHCSA 7 certification and puts you on the path to succeed the examination. At Linux Academy, we want to provide you with an in-depth understanding of managing a Red Hat system at an administrator level so that you can use your skills on real servers in the real world. The Linux Academy is in no away affiliated with Red Hat, Inc, and this course is not provided or reviewed by Red Hat, Inc.

 

Introduction

 

About This Course and How to Prepare

 

00:07:33

 

Lab Servers and Following Along

 

00:03:42

Essential Tools

 

Access a Shell Prompt and Issue Commands

 

00:10:15

 

Use Input/Output Redirection

 

00:17:57

 

Use grep and Regular Expressions to Analyze Text

 

00:16:09

 

Access Remote Systems Using SSH

 

00:12:57

 

Log in and Switch Users in Multiuser Targets

 

00:10:17

 

Archive, Compress, Unpack and Uncompress Files Using tar, star, gzip and bzip2

 

00:18:57

 

Create and Edit Text Files

 

00:16:04

 

Create, Delete, Copy and Move Files and Directories

 

00:12:08

 

Create Hard and Soft Links

 

00:11:03

 

List, Set and Change Standard UGO/RWX Permissions

 

00:31:48

 

List, Set and Change Standard UGO/RWX Permissions: umask

 

00:20:25

 

Locate, Read and Use System Documentation with man, info and /usr/share/doc

 

00:16:55

 

Finding Files with Locate and Find

 

00:10:57

 

Quiz: Understand and use essential tools

 

Exercise: Understanding umask

 

00:30:00

 

Exercise: Archiving and Compressing Files

 

00:30:00

 

Exercise: Finding Files with locate and find

 

00:30:00

Operate Running Systems

 

Boot, Reboot and Shutdown a System

 

00:10:31

 

Boot Systems into Different Targets Manually

 

00:18:17

 

Interrupt the Boot Process to Gain Access to a System

 

00:09:05

 

Identify CPU/Memory Intensive Processes, Adjust Process Priority and Kill Processes - Part 1

 

00:12:20

 

Identify CPU/Memory Intensive Processes, Adjust Process Priority and Kill Processes - Part 2

 

00:10:08

 

Identify CPU/Memory Intensive Processes, Adjust Process Priority and Kill Processes - Part 3

 

00:09:18

 

Identify CPU/Memory Intensive Processes, Adjust Process Priority and Kill Processes - Part 4

 

00:13:09

 

Locate and Interpret System Log Files and Journals

 

00:14:34

 

Access a Virtual Machine's Console

 

00:02:29

 

Start and Stop Virtual Machines

 

00:02:43

 

Start, Stop and Check the Status of Network Services

 

00:04:04

 

Securely Transfer Files Between Systems

 

00:06:44

 

Quiz: Operate running systems

 

Exercise: Working with Systemd and Targets

 

01:30:00

 

Exercise: Recovering the Root Password

 

00:30:00

 

Exercise: Interrupting the Boot Process to Change the Boot Target

 

00:30:00

 

Exercise: Powering Off Systems

 

00:30:00

 

Exercise: pgrep, pkill, kill and jobs

 

02:30:00

 

Exercise: nice, renice and ps

 

00:30:00

 

Exercise: Monitoring and Calculating CPU Load Averages

 

00:30:00

 

Exercise: Working with top

 

00:30:00

 

Exercise: Virtual Machines

 

00:30:00

Configure Local Storage

 

List, Create and Delete Partitions on MBR and GPT Disks

 

00:19:22

 

Create and Remove Physical Volumes, Assign Physical Volumes to Volume Groups and Create and Delete Logical Volumes

 

00:15:33

 

Configure Systems to Mount File Systems at Boot by UUID or Label

 

00:11:35

 

Add New Partitions and Logical Volumes and Swap to a System Non-Destructively

 

00:11:17

 

Quiz: Configure local storage

 

Hands-on Lab: Managing Logical Volumes on Red Hat Enterprise 7

 

Exercise: Working with MBR Partitions

 

00:30:00

 

Exercise: Working with GPT Partitions

 

00:30:00

 

Exercise: Creating Persistent Mounts with File System Labels

 

00:30:00

 

Exercise: Creating Swap Space

 

00:30:00

 

Exercise: Creating Swap Space from a LVM Volume

 

00:30:00

Create and Configure File Systems

 

Create, Mount, Unmount and Use VFAT, EXT4 and XFS File Systems

 

00:14:58

 

Mount and Unmount CIFS and NFS Network File Systems

 

00:11:17

 

Extend Existing Logical Volumes

 

00:13:59

 

Create and Configure Set-GID Directories for Collaboration

 

00:07:39

 

Create and Manage Access Control Lists (ACLs)

 

00:23:18

 

Diagnose and Correct File Permission Problems

 

00:03:53

 

Quiz: Create and configure file systems

 

Exercise: Filesystem ACLs

 

00:30:00

 

Hands-on Lab: Mounting CIFS and NFS Network File Systems

 

Hands-on Lab: Extending Existing Logical Volumes

Deploy, Configure and Maintain Systems

 

Configure Networking and Hostname Resolution Statically or Dynamically: Troubleshooting

 

00:06:50

 

Configure Networking and Hostname Resolution Statically or Dynamically: Network Manager

 

00:11:45

 

Configure Networking and Hostname Resolution Statically or Dynamically: Hostname Configuration

 

00:10:34

 

Schedule Tasks Using at and cron

 

00:25:35

 

Start and Stop Services and Configure Services to Start Automatically at Boot

 

00:07:53

 

Configure Systems to Boot into a Specific Target Automatically

 

00:01:17

 

Install Red Hat Enterprise Linux Automatically Using Kickstart

 

00:14:23

 

Configure a Physical Machine to Host Virtual Guests

 

00:05:59

 

Install Red Hat Enterprise Linux Systems as Virtual Guests

 

00:09:06

 

Configure Systems to Launch Virtual Machines at Boot

 

00:03:05

 

Configure Network Services to Start Automatically at Boot

 

00:02:10

 

Configure a System to Use Time Services

 

00:15:43

 

Install and Update Software Packages from Red Hat Network, a Remote Repository or the Local File System: YUM

 

00:11:21

 

Install and Update Software Packages from Red Hat Network, a Remote Repository or the Local File System: RPM

 

00:07:36

 

Install and Update Software Packages from Red Hat Network, a Remote Repository or the Local File System: Managing Repositories

 

00:08:22

 

Install and Update Software Packages from Red Hat Network, a Remote Repository or the Local File System: Configuring a Local Repository

 

00:05:23

 

Install and Update Software Packages from Red Hat Network, a Remote Repository or the Local File System: Configuring a Local Repository: Configure the GPG Key

 

00:05:42

 

Update the Kernel Package Appropriately to Ensure a Bootable System

 

00:06:40

 

Modifying the System Bootloader

 

00:02:31

 

Quiz: Deploy, configure, and maintain systems

 

Exercise: Scheduling Tasks on Red Hat Systems

 

00:30:00

 

Exercise: Working with Time Services

 

00:30:00

 

Exercise: Working with Yum

 

00:30:00

 

Exercise: Working with yum groups

 

00:30:00

 

Exercise: Working with RPM

 

00:30:00

 

Exercise: Managing Third Party Repositories

 

00:30:00

 

Exercise: Creating a local repository

 

00:30:00

 

Exercise: Networking

 

00:30:00

 

Hands-on Lab: Network Manager Sandbox

 

Hands-on Lab: Update the Kernel Package to Ensure a Bootable System

Manage users and groups

 

Create, Delete, and Modify Local User Accounts

 

00:18:30

 

Change Passwords and Adjust Password Aging for Local User Accounts

 

00:15:52

 

Create, Delete, and Modify Local Groups and Group Memberships

 

00:14:22

 

Using set-GID On Directories

 

00:08:38

 

Configure a System to Use an Existing Authentication Service for User and Group Information: Using Realmd

 

00:08:21

 

Hands-on Lab: Using an Existing Authentication Service

 

Hands-on Lab: Use Existing LDAP Credentials For Single Sign-On

 

Quiz: Manage Users And Groups

 

Exercise: Managing Users And Groups

 

01:00:00

Manage security

 

Configure Firewall Settings Using firewall-config, firewall-cmd, or iptables

 

00:19:07

 

Configure Key-Based Authentication for SSH

 

00:09:00

 

Introduction to SELinux

 

00:08:51

 

Set enforcing and permissive modes for SELinux

 

00:03:20

 

List and identify SELinux file and process context

 

00:09:50

 

Restore Default File Contexts

 

00:09:03

 

Use Boolean Settings to Modify System SELinux Settings

 

00:11:54

 

Diagnose and Address Routine SELinux Policy Violations

 

00:05:19

 

Hands-on Lab: Red Hat Security With FirewallD

 

Exercise: Configure key-based authentication for SSH

 

00:30:00

 

Exercise: Working With SELinux Context, Booleans, and Troubleshooting

 

01:30:00

Preparing For The Exam

 

How to Practice and Study After Completing the Course

 

00:02:26

 

Best Practices to Remember While Taking the Exam

 

00:02:07

 

Download link:

Ukryta Zawartość

    Treść widoczna tylko dla użytkowników forum DarkSiders. Zaloguj się lub załóż darmowe konto na forum aby uzyskać dostęp bez limitów.

 

Links are Interchangeable - No Password - Single Extraction

Udostępnij tę odpowiedź


Odnośnik do odpowiedzi
Udostępnij na innych stronach

Dołącz do dyskusji

Możesz dodać zawartość już teraz a zarejestrować się później. Jeśli posiadasz już konto, zaloguj się aby dodać zawartość za jego pomocą.

Gość
Dodaj odpowiedź do tematu...

×   Wklejono zawartość z formatowaniem.   Usuń formatowanie

  Dozwolonych jest tylko 75 emoji.

×   Odnośnik został automatycznie osadzony.   Przywróć wyświetlanie jako odnośnik

×   Przywrócono poprzednią zawartość.   Wyczyść edytor

×   Nie możesz bezpośrednio wkleić grafiki. Dodaj lub załącz grafiki z adresu URL.

    • 1 Posts
    • 1 Views
    • 1 Posts
    • 1 Views
    • 1 Posts
    • 1 Views
    • 1 Posts
    • 17 Views
    • 1 Posts
    • 14 Views

×
×
  • Dodaj nową pozycję...

Powiadomienie o plikach cookie

Korzystając z tej witryny, wyrażasz zgodę na nasze Warunki użytkowania.