Red Hat System Administration I (RH124) equips you with Linux® administration “survival skills” by focusing on foundational Linux concepts and core tasks. You will learn how to apply command-line concepts and enterprise-level tools, starting you on your journey toward becoming a full-time Linux system administrator. This path continues with the follow-on course, Red Hat System Administration II (RH134).
This course is based on Red Hat® Enterprise Linux 9.0.
As a result of attending this course, you should be able to perform essential Linux administration tasks, including installation, establishing network connectivity, managing physical storage, and basic security administration.
You should be able to demonstrate these skills:
Access the command line
Manage files from command line
Create, view, and edit text files
Manage local users and groups
Monitor and manage Linux processes
Control services and daemons
Control access to files with file system permissions
The primary persona is a technical professional with current or pending responsibilities as a Linux enterprise or cloud system administrator.
This course is targeted at the student who is planning to become a technical professional using Linux.
This offering lays the foundation for secure user and group administration, and develops skills that allow administrators to use available storage solutions more efficiently and securely. This course is the first of a two-part series that turns a computer professional who knows nothing about Linux into a fully capable Linux administrator.
Course structure
Introduce Linux and the Red Hat Enterprise Linux ecosystem.
Run commands and view shell environments.
Manage, organize, and secure files.
Manage users, groups and user security policies.
Control and monitor systemd services.
Configure remote access using the web console and SSH.
Configure network interfaces and settings.
Archive and copy files from one system to another.
Manage software using DNF
Prerequisites
Basic technical user skills with computer applications on some operating systems are expected.
There are no special technical requirements for this course.
This course is not designed for bring your own device (BYOD).
Internet access is not required but is recommended so that students can research and browse Red Hat online resources.
To provide the best possible service, we use technologies such as cookies. Consent to these technologies will allow us to process data such as crawling behavior or unique IDs on this site. Disagreement or withdrawal of consent may adversely affect certain features and functions.
Functional
Always active
Technical storage or access is essential for the legitimate purpose of enabling the use of a specific service expressly requested by a subscriber or user, or only for the purpose of transmitting a communication over an electronic communications network.
a:2:{s:4:"text";s:0:"";s:4:"show";b:1;}
a:2:{s:4:"text";s:0:"";s:4:"show";b:1;}
Statistics
Technical storage or access used exclusively for statistical purposes.a:2:{s:4:"text";s:0:"";s:4:"show";b:1;}
Marketing
Technical storage or access is required to create user profiles in order to advertise or track a user on a website or several websites for similar marketing purposes.