Alert:

This is the sole official MRGT platform. All information on our partners and affiliates is published here. Any individual or organization claiming association outside this site is unauthorized, and MRGT accepts no responsibility for their training programs, services, or any other engagements.
Disaster Recovery Professional (E|DRP)

Course Outline

Access systems and get help: Log in to local and remote Linux systems, and investigate problem resolution methods provided through Red Hat Insights and support.
Navigate file systems: Copy, move, create, delete, and organize files while working from the bash shell.
Manage local users and groups:  Create, manage, and delete local users and groups and administer local password policies.
Control access to files: Set Linux file system permissions on files and to interpret the security effects of different permission settings.
Manage SELinux security: Protect and manage the security of a server by using SELinux.
Tune system performance: Evaluate and control processes, set tuning parameters, and adjust process scheduling priorities on a Red Hat Enterprise Linux system.
Install and update software packages: Download, install, update, and manage software packages from Red Hat and DNF package repositories.
Manage basic storage: Create and manage storage devices, partitions, file systems, and swap spaces from the command line.
Control services and the boot process: Control and monitor network services, system daemons, and the boot process using systemd.
Manage networking: Configure network interfaces and settings on Red Hat Enterprise Linux servers.
Analyze and store logs: Locate and accurately interpret logs of system events for troubleshooting purposes.
Implement advanced storage features: Create and manage logical volumes containing file systems and swap spaces from the command line, and configure advanced storage features with Stratis and VDO.
Schedule future tasks: Schedule tasks to automatically execute in the future.
Access network-attached storage: Access network-attached storage, using the NFS protocol.
Manage network security: Control network connections to services using the system firewall and SELinux rules.
Running Containers: Obtain, run, and manage simple, lightweight services as containers on a single Red Hat Enterprise Linux server.