Red Hat Certified Engineer (Rhce) Exam (Ex300)

Course Description
The RHCE exam is a performance-based evaluation of Red Hat Enterprise Linux system administration skills and knowledge. Candidates perform a number of routine system administration tasks and are evaluated on whether they have met specific objective criteria. Performance-based testing means that candidates must perform tasks similar to what they must perform on the job.
About this course
Who Needs to Attend
- RHCEs who were certified on Red Hat Enterprise Linux version 4, 5 or 6
- Current RHCSAs
- Linux IT professionals who can demonstrate the competencies needed to earn an RHCE but have not taken the RHCE
- Solaris administrators with more than three years of experience
Outline
RHCE exam candidates should be able to accomplish the following without assistance. These have been grouped into several categories.
System configuration and management
- Use network teaming or bonding to configure aggregated network links between two Red Hat Enterprise Linux systems
- Configure IPv6 addresses and perform basic IPv6 troubleshooting
- Route IP traffic and create static routes
- Use FirewallD, including Rich Rules, Zones and custom rules, to implement packet filtering and configure network address translation (NAT)
- Use /proc/sys and sysctl to modify and set kernel runtime parameters
- Configure a system to authenticate using Kerberos
- Configure a systems as either an iSCSI target or initiator that persistently mounts an iSCSI target
- Produce and deliver reports on system utilization (processor, memory, disk, and network)
- Use shell scripting to automate system maintenance tasks
- Configure a system to log to a remote system
- Configure a system to accept logging from a remote system
Network Services
Network services are an important subset of the exam objectives. RHCE candidates should be capable of meeting the following objectives for each of the network services listed below:
- Install the packages needed to provide the service
- Configure SELinux to support the service
- Use SELinux port labelling to allow services to use non-standard ports
- Configure the service to start when the system is booted
- Configure the service for basic operation
- Configure host-based and user-based security for the service
HTTP/HTTPS
- Configure a virtual host
- Configure private directories
- Deploy a basic CGI application
- Configure group-managed content
- Configure TLS security
DNS
- Configure a caching-only name server
- Troubleshoot DNS client issues
NFS
- Provide network shares to specific clients
- Provide network shares suitable for group collaboration
- Use Kerberos to control access to NFS network shares
SMB
- Provide network shares to specific clients
- Provide network shares suitable for group collaboration
SMTP
- Configure a system to forward all email to a central mail server
SSH
- Configure key-based authentication
- Configure additional options described in documentation
NTP
- Synchronize time using other NTP peers
Database Services
- Install and configure MariaDB
- Backup and restore a database
- Create a simple database schema
- Perform simple SQL queries against a database