Red Hat Certified System Administrator (EX200) Cert Prep: 2 File Access, Storage, and Security

Go to class
Write Review

Free Online Course: Red Hat Certified System Administrator (EX200) Cert Prep: 2 File Access, Storage, and Security provided by LinkedIn Learning is a comprehensive online course, which lasts for 3-4 hours worth of material. The course is taught in English and is free of charge. Upon completion of the course, you can receive an e-certificate from LinkedIn Learning. Red Hat Certified System Administrator (EX200) Cert Prep: 2 File Access, Storage, and Security is taught by Grant McWilliams.

Overview
  • This course prepares you for the second half of the RHCSA exam. Learn how to manage users and groups, access Linux remotely, and configure local storage.

Syllabus
  • Introduction

    • Prepare for the RHCSA EX200 Exam
    • About Red Hat Certifications
    • What was covered in part 1
    • Lab setup
    1. Users and Accounts
    • Create and delete local user accounts
    • Modify local user accounts
    • Change passwords and adjust password aging for local user accounts
    • Manage aging for local user accounts
    • Create, delete, and modify local groups and group memberships
    • Log in and switch users in multiuser targets
    • Elevating privileges using sudo
    • Challenge: Users and accounts
    • Solution: Users and accounts
    2. Files Access Control
    • File and directory modes
    • Change file and directory ownership
    • Set permissions using numeric mode
    • Set permissions using symbolic mode
    • Initial permissions using umask
    • Special file bits: SUID and SGID
    • Special directory bits: SGID and Sticky
    • Read access control lists
    • Set access control lists (ACLs)
    • Configure inheritance with default access control lists
    • Delete access control lists
    • Challenge: File access control
    • Solution: File access control
    3. Manage Security
    • Set enforcing and permissive modes for SELinux
    • List and identify SELinux file and process context
    • Restore SELinux default file contexts
    • Use Booleans to modify SELinux behavior
    • Diagnose routine SELinux policy violations
    • Maintain security context when managing files
    • Manage firewalls with firewalld
    • Challenge: Manage security
    • Solution: Manage security
    4. Accessing Linux Remotely
    • Configure Secure Shell
    • Configure key-based authentication for SSH
    • Securely transfer files between systems
    • Access Linux from Windows using PuTTY
    • Access Linux from macOS or Linux using SSH
    • Access Linux from iOS using SSH
    • Access Linux from Android using SSH
    5. Configure Local Storage
    • List, create, and delete partitions on MBR and GPT disks
    • Manage LVM volumes and volume groups
    • Mount file systems at boot
    • Mount file systems at boot by ID or label
    • Extend existing logical volumes
    • Mount and unmount CIFS and NFS network file systems
    • Challenge: Local storage
    • Solution: Local storage
    Conclusion
    • Next steps