This Red Hat System Administration II (RH135) training course relates to Red Hat Enterprise Linux (RHEL) 9 and is specifically designed for students who have completed Red Hat System Administration I (RH124). Red Hat System Administration II (RH134) focuses on the key tasks needed to become a full time Linux administrator. This RH135 course goes deeper into enterprise Linux administration including file systems and partitioning, logical volumes, SELinux, firewalling, and troubleshooting.
This version of the course includes the Red Hat Certified System Administrator Exam (EX200). Attending both Red Hat System Administration I and Red Hat System Administration II can help you in your preparation for the Red Hat Certified System Administrator Exam (EX200).
Red Hat System Administration II Training with RHCSA Exam (RH135) Delivery Methods
Red Hat System Administration II Training with RHCSA Exam (RH135) Course Information
Topics Covered
- Installation using Kickstart
- Managing filesystems and logical volumes
- Managing scheduled jobs
- Accessing network filesystems
- Managing SELinux
- Controlling firewalling
- Troubleshooting
Prerequisites
Red Hat System Administration I (RH124)
Certification Information
Cost of the exam is included in the tuition price. Students must take the exam on the 5th day of class — Red Hat does not allow reschedules or issue vouchers for attendees who want to wait to take the exam at a later date.
RH135 Course Outline
- Automate the installation of Red Hat Enterprise Linux systems with Kickstart.
- Write regular expressions that, when partnered with grep, will allow you to quickly isolate or locate content within text files.
- Introduce the vim text editor, with which you can open, edit, and save text files.
- Schedule tasks to automatically execute in the future.
- Influence the relative priorities at which Linux processes run.
- Manage file security using POSIX access control lists.
- Manage the Security Enhanced Linux (SELinux) behavior of a system to keep it secure in case of a network service compromise.
- Configure systems to use central identity management services.
- Manage simple partitions and file systems.
- Manage logical volumes from the command line.
- Access (secure) NFS shares.
- Use autofs and the command line to mount and unmount SMB file systems.
- Configure a basic firewall.
- Practice and demonstrate knowledge and skills learned in this course.