Opsgility Official Training
Red Hat System Administration Ii (Rh 134)

Course Description
Red Hat® System Administration II (RH134) helps you in your preparation for the Red Hat Certified System Administrator Exam (EX200).
This course is for individuals who have completed Red Hat® System Administration I
(RH124). It focuses on the key tasks needed to become a full-time administrator of
Red Hat Enterprise Linux 9. Attending both Red Hat® System Administration I
(RH124) and Red Hat® System Administration II (RH134) can help you in your preparation for the Red Hat Certified System Administrator Exam (EX200).
About this course
What You'll Learn
- Installation using Kickstart
- Managing filesystems and logical volumes
- Managing scheduled jobs
- Accessing network filesystems
- Managing SELinux
- Controlling firewalling
- Troubleshooting
Who Needs to Attend
- Individuals who have completed Red Hat® System Administration I (RH124)
- Individuals that have not taken a previous Red Hat course are encouraged to take either Red Hat® System Administration I (RH124) if they are new to Linux, or the RHCSA® Rapid Track Course with Exam (RH200) if they are experienced with enterprise Linux administration
Course Outline
- Automate installation with Kickstart
- Automate the installation of Red Hat Enterprise Linux systems with Kickstart
- Use regular expressions with grep
- Write regular expressions that, when partnered with grep, will allow you to quickly isolate or locate content within text files
- Create and Edit text files with vim
- Introduce the vim text editor, with which you can open, edit, and save text files
- Schedule future Linux tasks
- Schedule tasks to automatically execute in the future
- Manage priority of Linux processes
- Influence the relative priorities at which Linux processes run
- Control access to files with access control lists (ACL)
- Manage file security using POSIX access control lists
- Manage SELinux security
- Manage the Security Enhanced Linux (SELinux) behavior of a system to keep it secure in case of a network service compromise
- Connect to network-defined users and groups
- Configure systems to use central identity management services
- Add disks, partitions, and file systems to a Linux system
- Manage simple partitions and file systems
- Configure a basic firewall
- Comprehensive review
- Practice and demonstrate knowledge and skills learned in this course