Alert:

This is the sole official MRGT platform. All information on our partners and affiliates is published here. Any individual or organization claiming association outside this site is unauthorized, and MRGT accepts no responsibility for their training programs, services, or any other engagements.
Red Hat Certified System Administrator (RHCSA)

Course Outline

Access systems and get help: Log in to local and remote Linux systems, and investigate problem resolution methods provided through Red Hat Insights and support.
Navigate file systems: Copy, move, create, delete, and organize files while working from the bash shell.
Manage local users and groups:  Create, manage, and delete local users and groups and administer local password policies.
Control access to files: Set Linux file system permissions on files and to interpret the security effects of different permission settings.
Manage SELinux security: Protect and manage the security of a server by using SELinux.
Tune system performance: Evaluate and control processes, set tuning parameters, and adjust process scheduling priorities on a Red Hat Enterprise Linux system.
Install and update software packages: Download, install, update, and manage software packages from Red Hat and DNF package repositories.
Manage basic storage: Create and manage storage devices, partitions, file systems, and swap spaces from the command line.
Control services and the boot process: Control and monitor network services, system daemons, and the boot process using systemd.
Manage networking: Configure network interfaces and settings on Red Hat Enterprise Linux servers.
Analyze and store logs: Locate and accurately interpret logs of system events for troubleshooting purposes.
Implement advanced storage features: Create and manage logical volumes containing file systems and swap spaces from the command line, and configure advanced storage features with Stratis and VDO.
Schedule future tasks: Schedule tasks to automatically execute in the future.
Access network-attached storage: Access network-attached storage, using the NFS protocol.
Manage network security: Control network connections to services using the system firewall and SELinux rules.
Running Containers: Obtain, run, and manage simple, lightweight services as containers on a single Red Hat Enterprise Linux server.

Course Outline

Manage security and risk: Define strategies to manage security on Red Hat Enterprise Linux servers.
Automate configuration and remediation with Ansible: Remediate configuration and security issues with Ansible Playbooks.
Protect data with LUKS and NBDE: Encrypt data on storage devices with LUKS and use NBDE to manage automatic decryption when servers are booted.
Restrict USB device access: Protect system from rogue USB device access with USBGuard.
Control authentication with PAM: Manage authentication, authorization, session settings, and password controls by configuring pluggable authentication modules (PAMs).
Record system events with audit: Record and inspect system events relevant to security, using the Linux kernel’s audit subsystem and supporting tools.
Monitor file system changes: Detect and analyze changes to a server’s file systems and their contents using AIDE.
Mitigate risk with SELinux: Improve security and confinement between processes by using SELinux and advanced SELinux techniques and analyses.
Manage compliance with OpenSCAP: Evaluate and remediate a server’s compliance with security policies by using OpenSCAP.
Automate compliance with Red Hat Satellite: Automate and scale your ability to perform OpenSCAP checks and remediate compliance issues using Red Hat Satellite.
Analyze and remediate issues with Red Hat Insights: Identify, detect, and correct common issues and security vulnerabilities with Red Hat Enterprise Linux systems by using Red Hat Insights.
Perform a comprehensive review: Review the content covered in this course by completing hands-on review exercises.

Course Outline

Introduction to troubleshooting: Describe a generalized strategy for troubleshooting.
Take proactive steps to prevent small issues: Prevent small issues from becoming large problems by employing proactive system administration techniques.
Troubleshoot boot issues: Identify and resolve issues that can affect a system’s ability to boot.
Identify hardware issues: Identify hardware problems that can affect a system’s ability to operate.
Troubleshoot storage issues: Identify and fix issues related to storage.
Troubleshoot RPM issues: Identify and fix problems in, and using, the package management subsystem.
Troubleshoot network issues: Identify and resolve network connectivity issues.
Troubleshoot application issues: Debug application issues.
Deal with security issues: Identify and fix issues related to security subsystems.
Troubleshoot kernel issues: Identify kernel issues and assist Red Hat Support in resolving kernel issues.
Red Hat Enterprise Linux Diagnostics and Troubleshooting comprehensive review: Practice and demonstrate knowledge and skills learned in Red Hat Enterprise Linux Diagnostics and Troubleshooting.

Course Outline

Identity Management in Red Hat Enterprise Linux: Introduce Identity Management in Red Hat Enterprise Linux (IdM) and its high-level architecture.
Identity Management Core Technologies:Review the core technologies of Identity Management (IdM) in Red Hat Enterprise Linux.
Installing Identity Management in Red Hat Enterprise Linux: Install Identity Management servers, replicas, and clients on Red Hat Enterprise Linux 9.
Implementing an Identity Management Topology: Implement continuous functionality and high availability of IdM services in single-site and geographically distributed topologies.
Managing the CA and DNS Integrated Services: Manage the Certificate Authority (CA) and the Domain Name System (DNS) services that are integrated with Identity Management.
Managing Users and Controlling User Access: Configure users for authorized access to services and resources.
Configuring Alternative Authentication Services: Configure and manage smart card authentication, secrets, and two-factor authentication.
Integrating Identity Management with Active Directory: Implement a cross-forest trust between Identity Management and Active Directory, and configure ID views to map POSIX attributes to Active Directory users.
Integrating Identity Management with Red Hat Utilities: Integrate an Identity Management deployment with Red Hat Satellite and Red Hat Ansible Automation Platform.
Troubleshooting and Disaster Recovery Planning for IdM: Troubleshooting and preparing for disaster recovery with Identity Management.
Comprehensive Review: Build a small, resilient Identity Management topology to include multiple replicas and clients, populated with multiple users, credentials, policies, and access rights.

Course Outline

Course Outline

Introduction to troubleshooting:Describe a generalized strategy for troubleshooting.
Take proactive steps to prevent small issues: Prevent small issues from becoming large problems by employing proactive system administration techniques.
Troubleshoot boot issues: Identify and resolve issues that can affect a system’s ability to boot.
Identify hardware issues: Identify hardware problems that can affect a system’s ability to operate.
Troubleshoot storage issues: Identify and fix issues related to storage.
Troubleshoot RPM issues: Identify and fix problems in, and using, the package management subsystem.
Troubleshoot network issues: Identify and resolve network connectivity issues.
Troubleshoot application issues: Debug application issues.
Deal with security issues: Identify and fix issues related to security subsystems.
Troubleshoot kernel issues: Identify kernel issues and assist Red Hat Support in resolving kernel issues.
Red Hat Enterprise Linux Diagnostics and Troubleshooting comprehensive review: Practice and demonstrate knowledge and skills learned in Red Hat Enterprise Linux Diagnostics and Troubleshooting.