0% found this document useful (0 votes)
37 views3 pages

Karthik Linux Course Content

The document outlines the content covered in a 4 week Linux Admin Course (RHCSA) including topics like Linux commands, installation, user management, tools, file systems, networking, security and more.

Uploaded by

Mehboob
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views3 pages

Karthik Linux Course Content

The document outlines the content covered in a 4 week Linux Admin Course (RHCSA) including topics like Linux commands, installation, user management, tools, file systems, networking, security and more.

Uploaded by

Mehboob
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Linux Admin Course Content (RHCSA)

Trainer: Karthik
Course Duration: 4 Weeks

For Upcoming Batches Details: Click Here

We can also provide training on AWS, Azure, Python & Many


more courses for more information please contact us on below
mention numbers.

Follow Us on
Telegram Group: Click Here
Facebook Page: Click Here
YouTube: Click Here
Instagram: Click Here
LinkedIn: Click Here

For More Information Call or WhatsApp - +91-9390246410, +91-8074509049


Email: support@logiclabstech.com
www.logiclabstech.com
Linux Course Content
➢ Introduction to Red hat Enterprise Linux 8
• Essential & Advanced Linux Commands
• Installation of RHEL 8 in VMWare Workstation and AWS instance
• Performance Monitoring
➢ Manage users and groups
• Create, delete, and modify local user accounts
• Change passwords and adjust password aging for local user accounts
• Create, delete, and modify local groups and group memberships
• Configure superuser access
➢ Understand and use essential tools
• Use grep and regular expressions to analyze text
• Access remote systems using SSH
• Archive, compress, unpack, and uncompress files using tar, star, gzip, and
bzip2
• Create, delete, copy, and move files and directories
• Create hard and soft links
• List, set, and change standard ugo/rwx permissions
➢ Operate Running Systems
• Boot, reboot, and shut down a system normally
• Boot systems into different targets manually
• Interrupt the boot process in order to gain access to a system
• Identify CPU/memory intensive processes and kill processes
• Adjust process scheduling
• Manage tuning profiles
• Locate and interpret system log files and journals
• Preserve system journals
• Start, stop, and check the status of network services
• Securely transfer files between systems
➢ Configure LVM
• List, create, delete partitions on MBR and GPT disks
• Create and remove physical volumes
• Assign physical volumes to volume groups
• Create and delete logical volumes

www.logiclabstech.com support@logiclabstech.com
Linux Course Content
• Configure systems to mount file systems at boot by universally unique ID
(UUID) or label
• Add new partitions and logical volumes, and swap to a system non-
destructively
➢ Create and configure file systems
• Create, mount, unmount, and use vfat, ext4, and xfs file systems
• Mount and unmount network file systems using NFS
• Configure autofs
• Extend existing logical volumes
• Create and configure set-GID directories for collaboration
• Diagnose and correct file permission problems
➢ Deploy, configure, and maintain systems
• Schedule tasks using at and cron
• Start and stop services and configure services to start automatically at boot
• Configure systems to boot into a specific target automatically
• Configure time service clients
• Install and update software packages from Red Hat Network, a remote
repository, or from the local file system
• Modify the system bootloader
➢ Manage basic networking
• Configure IPv4 and IPv6 addresses
• Configure hostname resolution
• Configure network services to start automatically at boot
• Restrict network access using firewall-cmd/firewall
➢ Manage security
• Configure firewall settings using firewall-cmd/firewalld
• Manage default file permissions
• Configure key-based authentication for SSH
• Set enforcing and permissive modes for SELinux
• List and identify SELinux file and process context
• Restore default file contexts
• Manage SELinux port labels
• Use boolean settings to modify system SELinux settings
• Diagnose and address routine SELinux policy violations

www.logiclabstech.com support@logiclabstech.com

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy