+977-9851127912 / Landline : +977-1-4421630

Red Hat Enterprise Linux 9 Administration (RHCSA+RHCE) Training

Date Duration Time Discount Actual Price Our Price
January 29 90 Hours 07:00 AM Call or email Call or email Call or email
Linux System & Services Administration with Automation course prepares students to become a professional Linux administrator. This course also prepares the students for  Red Hat Certified System Administrator (RHCSA) & Red Hat Certified Engineer (RHCE) certification exams. This course begins from scratch and gradually takes to a professional level. This is an extensive course to learn Linux Administration in depth. We assure that after taking this course, students will be able to work in Level 1 to Level 3 Linux jobs. The course syllabus has been divided into four modules.
In first module, Basics of Linux Administration, students learn basic Linux commands which are frequently used in day to day life. Students learn Linux installation, core Linux commands, methods of getting help, vi/vim editor, string manipulation tools, accessing Linux file system, using redirection operators, managing local users and groups, control access to files, monitoring and managing Linux processes. This part of the course also lays strong foundation on the top of which rest of the course is designed.
In the second module, Linux System Administration, students learn system administration skills like installing and updating software packages, installing Red Hat Enterprise Linux, controlling boot process, controlling services and daemons, running containers, scheduling future tasks, analyzing and storing logs, tuning system performance, managing basic storage, managing storage stack, managing networking, configuring and securing SSH, archiving and transferring files, accessing network attached storage, managing SELinux security, managing network security, analyzing servers and getting support.
The third module is Linux Services and Security Administration. In this part of the course, students learn how to configure DNS server, iSCSI shared storage, NFS server, SAMBA server, MySQL/MariaDB database server, Apache httpd & nginx Web server, Mail server, LDAP server, Kerberos server, VPN server, basics of cybersecurity & detecting and responding to security breaches. At the end of this course, students will be able to manage network services and protect them from security attacks.
In the fourth module, Linux Automation using Ansible, students learn how to automate configuration of Linux systems using ansible playbooks. They learn what is ansible, deploying ansible, implementing playbooks, managing variables and facts, implementing task control, deploying files to managed hosts, managing large projects, simplifying playbooks with roles, troubleshooting ansible & automating Linux administration tasks.
To reinforce and evaluate students learning, they are given assignments after each unit. At the end of each module, there will be live practical test. These assignments and practical tests will prepare students to crack interview, manage real time system as well as it will make them confident to attend Red Hat RHCSA & RHCE Certification exams.
 
The assignments and tests are prepared in such a way that it prepares the students to work in production enviromnet, succeed in the interviews and pass the certification exams.
Module-I: Basics of Linux Administration (RHCSA) 
  1. Introduction to Linux
  • What is Linux?
  • What is Open Source Software?
  • Distributions of Linux
  • Flavors of Unix
  • Jobs Roles that Require Linux Skills
  • Linux Certifications 
  1. Installing Linux
  • Installing Virtualization Software
  • Creating a Virtual Machine
  • Installing RHEL 9 in a Virtual Machine in Basic Way
  • Cloning a Virtual Machine 
  1. Core Linux Commands
  • Access the Command Line
  • Access the Command Line with Desktop
  • Execute Commands with the Bash Shell
  • Basic Linux Commands
  • Opening a Terminal
  • Creating a User and Setting Password for the User and Switching User’s Account
  • Changing Own Password and Guidelines for Choosing a Good Password
  • Creating, Listing, Viewing and Modifying a File
  • Creating and Changing a Directory
  • Understanding Linux File System Hierarchy
  • Basic Linux Commands (clear, poweroff, reboot, exit, date, cal, etc.)
  • General Syntax of Commands
  • Executing Multiple Commands at a time
  • Creating Hidden Files and Files with Special Character in their Name
  • Creating Command’s Alias
  • Methods of Specifying Paths
  • Using {}
  • Moving and Renaming Files & Directories
  • Copying Files and Directories
  • Removing Files and Directories
  • Using Wildcard Characters
  • Viewing Command’s History and setting command’s history size
  • Creating Soft & Hard Link
  • Compressing & Decompressing a File
  • Creating, Listing And Extracting an Archive
  • Getting Information About Disk, Memory & CPU
  • Getting Information About Files Using stat & file Commands
  • Initializing Variables
  • Using Different Types of Quotes
  • Login Scripts & Logout Script
  • Switching between CUI & GUI
  1. Getting Help
  • Using man Command to Get Help
  • Using --help Option to Get Help
  • Getting Online Documentations 
  1. Using vi/vim Editor
  • Inserting Text in a File
  • Cursor Movement Techniques in a File
  • Delete, Copy and Paste Text in a File
  • Searching Text in a File
  • Performing Search and Replace Operations in a File
  • Protecting a File Using Password
  • Recovering a File After Abnormal Termination 
  1. Using String Manipulations Tools
  • Viewing First Few Lines of a File (head)
  • Viewing Last Few Lines of a File (tail)
  • Viewing Content of a Long File (less)
  • Displaying Total Count of Characters, Words and Lines of a File (wc)
  • Using Pipeline (|)
  • Displaying Specific Data of a File (cut)
  • Displaying Content of a File in Ordered Form (sort)
  • Showing Differences Between Two Files (diff)
  • Displaying Pattern Matching Lines in File (grep)
  • Using sed & awk commands 
  1. Access Linux File Systems
  • Identify File Systems and Devices
  • Mount and Unmount File Systems and Devices
  • Locate Files on the System 
  1. Using Re-direction Operators
  • Using Redirection Operators (>, >>, 2>,<)
  • Using tr command 
  1. Managing Local Users and Groups
  • Describe User and Group Concepts
  • Gain Superuser Access
  • Manage Local User Accounts
  • Manage Local Group Accounts
  • Manage User Passwords 
  1. Control Access to Files
  • Interpret Linux File System Permissions
  • Manage File System Permissions from the Command Line
  • Manage Default Permissions and File Access 
  1. Monitor and Manage Linux Processes
  • Process States and Lifecycle
  • Control Jobs
  • Kill Processes
  • Monitor Process Activity 
  1. Bash Shell Scripting
  • What is a Shell Script?
  • Creating a Simple Bash Shell Script
  • Setting Path
  • Executing an Script
  • Different Types of Bash Shell Operators
  • Creating a Shell Script Using if
  • Creating a Shell Script Using case
  • Creating a Shell Script Using Positional Parameter
  • Creating a Script Using Loop
  • Creating & Calling Functions in bash Script
  1. Test 1
  • Module-I Test
Module-II: Linux System Administration (RHCSA) 
  1. Install and Update Software Packages
  • Register System for Red Hat Support
  • Explain and Investigate RPM Software Packages
  • Install and Update Software Packages with DNF
  • Enable DNF Software Repositories 
  1. Install Red Hat Enterprise Linux
  • Install Red Hat Enterprise Linux
  • Automat Installation with Kickstart
  • Install and Configure Virtual Machines 
  1. Control Boot Process
  • Select a Boot Target
  • Reset the Root Password
  • Repair File System Issues at Boot 
  1. Control Services and Daemons
  • Identify Automatically Started System Processes
  • Control System Services 
  1. Run Containers
  • Container Concepts
  • Deploy Containers
  • Manage Container Storage and Network Resources
  • Manage Containers as System Services 
  1. Schedule Future Tasks
  • Schedule a Deferred User Job
  • Schedule Recurring User Jobs
  • Schedule Recurring System Jobs
  • Manage Temporary Files 
  1. Analyze and Store Logs
  • Describe System Log Architecture
  • Review Syslog Files
  • Review System Journal Entries
  • Preserve the System Journal
  • Maintain Accurate Time 
  1. Tune System Performance
  • Adjust Tuning Profiles
  • Influence Process Scheduling 
  1. Manage Basic Storage
  • Add Partitions, File Systems, and Persistent Mounts
  • Manage Swap Space 
  1. Manage Storage Stack
  • Create and Extend Logical Volumes
  • Manage Layered Storage 
  1. Manage Networking
  • Describe Networking Concepts
  • Validate Network Configuration
  • Configure Networking from Command Line
  • Edit Network Configuration Files
  • Configure Hostnames and Name Resolution 
  1. Configure and Secure SSH
  • Access the Remote Command Line with SSH
  • Configure SSH Key-based Authentication
  • Customize OpenSSH Service Configuration 
  1. Archive and Transfer Files
  • Manage Compressed tar Archives
  • Transfer Files Between Systems Securely
  • Synchronize Files Between Systems Securely 
  1. Access Network-Attached Storage
  • Manage Network Attached Storage with NFS
  • Automount Network-Attached Storage 
  1. Manage SELinux Security
  • Change the SELinux Enforcement Mode
  • Control SELinux File Contexts
  • Adjust SELinux Policy with Booleans
  • Investigate and Resolve SELinux Issues 
  1. Manage Network Security
  • Manage Server Firewalls
  • Control SELinux Port Labelling 
  1. Analyze Servers and Get Support
  • Analyze and Manage Remote Servers
  • Get Help From Red Hat Customer Portal 
  1. Test 2
  • Module-2 Test
 Module-III: Linux Services & Security Administration (Additional Module)
Configuring DNS Server
  • What is DNS Server and How it Works?
  • Types and Hierarchy of DNS Servers
  • Registering a Domain
  • Configuring a Zone File for Forward Lookup
  • Configuring a Zone File for Reverse Lookup
  • Using Different DNS Query Tools 
  1. Configuring iSCSI Shared Storage
  • Configuring iSCSI Shared Storage
  • Accessing iSCSI Shared Storage 
  1. Configuring NFS Server
  • Configuring NFS Server to Share Folders
  • Configuring NFS Client to Access NFS Shared Folders 
  1. Configuring SAMBA Server
  • Sharing Directories Using SAMBA
  • Accessing the SAMBA-shared Directories From Linux Client Machine
  • Accessing the SAMBA-shared Directories From Windows Client Machine
  • Accessing Windows-Shared Directories From Linux Client Machine
  1. Configuring Database Server (MySQL/MariaDB)
  • Creating a Database
  • Securing Database Login
  • Login into the Database
  • Creating Tables into the Database
  • Inserting, Modifying and Deleting Records into a Table
  • Creating Users into the Database
  • Granting & Revoking Privileges to Users
  • Taking Backup of the Database
  • Restoring Database From Backup
  • Restricting Remote login into the Database 
  1. Configuring Web Server (HTTPD & Nginx)
  • Hosting a Website
  • Hosting Virtual Websites
  • Hosting HTML, PHP & Python-based Websites
  • Hosting Authenticated Web Site
  • Restricting Access to the Website
  • Hosting SSL-Enabled Website 
  1. Configuring Mail Server (Postfix, Dovecot & Squirrelmail)
  • Configuring Postfix for SMTP Service
  • Configuring Dovecot for POP & IMAP Services
  • Configuring Squirrelmail for Webmail 
  1. Configuring LDAP Server
  • Configuring Open LDAP Server
  • Configuring Client to Connect to the LDAP Server for Authentication 
  1. Configuring Kerberos Server (Single Sign On)
  • Configuring Kerberos Server
  • Configuring Kerberos Client 
  1. Configuring VPN Server
  • Configuring VPN Server 
  1. Basics of Cybersecurity
  • Cyber Threats
  • History of Cyber Attacks
  • CIA Triad
  • Vulnerability, Threat & Risk
  • Basics of Cryptography
  • Types of Cyber Attacks
  • Malware
  • Phishing
  • Password Attacks
  • DDoS Attack
  • Packet Flooding
  • Man in the Middle Attack
  • Malvertising
  • Rogue Software 
  1. Detecting and Responding to Security Breaches
  • Performing Regular Performance Audits
  • Making Sure Users Stay Within Secure Limits
  • Logging Access into the Network
  • Monitoring Account Behavior for Security Issues
  • Creating an Incident Response Plan
  • Having Live Linux CDs Ready for Forensics Purposes
  • When You Put Your Plan into Action
  • Secure Backup and Recovery Tools
  • The Right Way to Save Compromised Data as Evidence
  • Disaster Recovery from a Security Breach
  • How and When to Share with the Open Source Community
  • Best Practices: Security Breach Detection and Response 
  1. Test 3
  • Module-III Test 
Module-IV: Automation Using Ansible (RHCE) 
  1. Introducing Ansible
  • Automating Linux Administration with Ansible
  • Installing Ansible 
  1. Deploying Ansible
  • Building an Ansible Inventory
  • Managing Ansible Configuration Files
  • Running Ad Hoc Commands 
  1. Implementing Playbooks
  • Writing and Running Playbooks
  • Implementing Multiples Plays 
  1. Managing Variables and Facts
  • Managing Variables
  • Managing Secrets
  • Managing Facts 
  1. Implementing Task Control
  • Writing Loops and Conditional Tasks
  • Implementing Handlers
  • Handling Task Failures 
  1. Deploying Files to Managed Hosts
  • Modifying and Copying Files to Hosts
  • Deploying Custom Files with Jinja2 Templates 
  1. Managing Large Projects
  • Selecting Hosts with Host Patterns
  • Managing Dynamic Inventories
  • Configuring Parallelism
  • Including and Importing Files 
  1. Simplifying Playbooks with Roles
  • Describing Role Structure
  • Reusing Content with System Roles
  • Creating Roles
  • Deploying Roles with Ansible Galaxy 
  1. Troubleshooting Ansible
  • Troubling Playbooks
  • Troubleshooting Ansible Managed Hosts 
  1. Automating Linux Administration Tasks
  • Managing Software and Subscriptions
  • Managing Users and Authentication
  • Managing Boot Process and Scheduled Process
  • Managing Storage
  • Managing Network Configuration 
  1. Test 4
  • Module-IV Test
Who should take this course?
Anyone who wants to build career as Linux Engineer/Administrator can attend this training.
What are the prerequisites for taking up this course?
As we start the course from scratch, anyone with basic knowledge of computer can join the course.
What is special about training from Professional IT Solution?
Our main strength is our long training experience and quality of our training. We have been producing skilled IT man power over a decade. Our trainer has more than 2 decade of training experience. Another major advantage is the quality of our training. We assure you that you’ll enjoy our training sessions.
How do you make participants ready for cracking interview and get jobs?
We engage our students with assignments that asks them to implement real time tasks which will make them confident to reply to the interviewers and handle their production servers when get selected.
Do you prepare students for taking up certification exams?
Yes, we take special exam preparations classes. 
Do you also help your students in finding jobs?
Yes, of course! As large number of companies contact us for providing our skilled students for their job vacancies. So, we forward our students’ resume to the companies based on their skill match. But they have to crack interview to get selected. As during the training session we prepare our students with the possible questions/scenarios during interview, most of them crack interview successfully.
Do you Provide certificate after course completion?
Yes, we provide certificate of course completion. There should be at least 70% attendance in the class and should obtain at least 70% marks in the comprehensive test to obtain certificate of attendance.
What is success rate of your students in the Exam?
Almost 100% students (who appeared the exam)  have passed their exam with excellent score.
What is the placement status of your students?
Almost 100% students have got placement.
What types of companies have you served?
Many renowned banks, telecoms, software companies and government organizations.
Red Hat Certified System Administrator (RHCSA) Exam

The performance-based Red Hat Certified System Administrator (RHCSA) exam (EX200) tests your knowledge in areas of system administration common across a wide range of environments and deployment scenarios. The skills tested in this exam are the foundation for system administration across all Red Hat® products.
By passing this exam, you become a Red Hat Certified System Administrator. If you choose to continue your learning journey beyond RHCSA, the credential can also serve as a foundational step on your path toward our highest level of certification—Red Hat Certified Architect.
Exam format
The Red Hat Certified System Administrator (RHCSA) exam is a hands-on, practical exam that requires you to undertake real-world tasks. Internet access is not provided during the in-person exam, and you will not be permitted to bring any hard copy or electronic documentation into the exam. This prohibition includes notes, books, or any other materials. For most exams, the documentation that ships with the product is available during the exam.
This exam can also be taken virtually as part of our remote testing format. Find out more about remote exams to see if this is the right choice for you.

Exam description (Red Hat Certified Engineer (RHCE)  Exam

The performance-based Red Hat Certified Engineer (RHCE) exam for Red Hat Enterprise Linux 8 (EX294) tests your knowledge and skill in managing multiple systems using Red Hat® Ansible® Automation Platform and executing common system administration tasks across a number of systems with Ansible. The skills tested in this exam are the foundation for system administration across many Red Hat products.
By passing this exam, you become a Red Hat Certified Engineer. An RHCE® is a Red Hat Certified System Administrator (RHCSA) who is ready to use Ansible and scripting to automate Red Hat® Enterprise Linux® tasks, integrate Red Hat emerging technologies, and apply automation for efficiency and innovation. Current RHCSA certification is required to earn RHCE certification. If you choose to continue your learning journey beyond RHCE, the credential can also serve as a foundational step on your path toward our highest level of certification—Red Hat Certified Architect.

Name: Sanjiv R. Karn
Email: sanjiv@professionalitsolution.com
Designation: Chief Trainer

Global IT Certifications
Oracle Database
  • OCA [Oracle Certified Associate]
  • OCP [Oracle Certified Professional]
 RHCI [Red Hat Certified Instructor]
 Linux
  • RHCSA [Red Hat Certified System Administrator]
  • RHCE [Red Hat Certified Engineer]
 OpenStack Cloud
  • RHCSA [Red Hat Certified OpenStack Administrator]
 Ansible Automation
  • RHCS-Ansible [RedHat Certified Specialist in Ansible Automation]
 VMware Datacenter
  • VCP [VMware Certified Professional]
 Advanced IT Trainings
  • DevOps Professional (Git, Jenkins, Maven, Docker Container, Kubernetes, OpenShift, Ansible, Cloud, Nagios, Terraform)
  • Oracle RAC, Data Guard, Golden Gate & PT
  • Big Data, Data WareHouse, Data Science, NoSQL
  • Linux Server Hardening
 Experience
  • 20 Years of Training experience.
  • Trained 400+ batches (DevOps, Oracle Database, Linux, Ansible , OpenStack, VMware)
  • The Most Experienced Red Hat Trainer in Nepal
  • Trained large number of IT Professionals from many renowned national & international organizations (Govt. Organizations, Telecoms, Banks, IT Companies, Colleges, etc.)
  • Worked as consultant in many organizations

This is instructor led live virtual class

Self-paced videos are available for self-learners.

Our assignments and tests prepares students for real-time work.

After completing this training, students become ready to take Red Hat’s certification exams (RHCSA & RHCE).

We have both the regular weekdays classes as well as long hour weekend classes.

We provide support to our students in the case of any technical issues.

Course Review

Recent Posts

Quick Links