Red Hat Certified System Administrator (EX200) Cert Prep: 2 File Access, Storage, and Security

  • 3-4 hours worth of material
  • LinkedIn Learning
  • English
Red Hat Certified System Administrator (EX200) Cert Prep: 2 File Access, Storage, and Security

Course Overview

This course prepares you for the second half of the RHCSA exam. Learn how to manage users and groups, access Linux remotely, and configure local storage.

Course Circullum

Introduction
  • Prepare for the RHCSA EX200 Exam
  • About Red Hat Certifications
  • What was covered in part 1
  • Lab setup
1. Users and Accounts
  • Create and delete local user accounts
  • Modify local user accounts
  • Change passwords and adjust password aging for local user accounts
  • Manage aging for local user accounts
  • Create, delete, and modify local groups and group memberships
  • Log in and switch users in multiuser targets
  • Elevating privileges using sudo
  • Challenge: Users and accounts
  • Solution: Users and accounts
2. Files Access Control
  • File and directory modes
  • Change file and directory ownership
  • Set permissions using numeric mode
  • Set permissions using symbolic mode
  • Initial permissions using umask
  • Special file bits: SUID and SGID
  • Special directory bits: SGID and Sticky
  • Read access control lists
  • Set access control lists (ACLs)
  • Configure inheritance with default access control lists
  • Delete access control lists
  • Challenge: File access control
  • Solution: File access control
3. Manage Security
  • Set enforcing and permissive modes for SELinux
  • List and identify SELinux file and process context
  • Restore SELinux default file contexts
  • Use Booleans to modify SELinux behavior
  • Diagnose routine SELinux policy violations
  • Maintain security context when managing files
  • Manage firewalls with firewalld
  • Challenge: Manage security
  • Solution: Manage security
4. Accessing Linux Remotely
  • Configure Secure Shell
  • Configure key-based authentication for SSH
  • Securely transfer files between systems
  • Access Linux from Windows using PuTTY
  • Access Linux from macOS or Linux using SSH
  • Access Linux from iOS using SSH
  • Access Linux from Android using SSH
5. Configure Local Storage
  • List, create, and delete partitions on MBR and GPT disks
  • Manage LVM volumes and volume groups
  • Mount file systems at boot
  • Mount file systems at boot by ID or label
  • Extend existing logical volumes
  • Mount and unmount CIFS and NFS network file systems
  • Challenge: Local storage
  • Solution: Local storage
Conclusion
  • Next steps
out of 5.0
5 Star 85%
4 Star 75%
3 Star 53%
1 Star 20%

Item Reviews - 3

Submit Reviews

Free Trial Available

This Course Include:
Introduction
  • Prepare for the RHCSA EX200 Exam
  • About Red Hat Certifications
  • What was covered in part 1
  • Lab setup
1. Users and Accounts
  • Create and delete local user accounts
  • Modify local user accounts
  • Change passwords and adjust password aging for local user accounts
  • Manage aging for local user accounts
  • Create, delete, and modify local groups and group memberships
  • Log in and switch users in multiuser targets
  • Elevating privileges using sudo
  • Challenge: Users and accounts
  • Solution: Users and accounts
2. Files Access Control
  • File and directory modes
  • Change file and directory ownership
  • Set permissions using numeric mode
  • Set permissions using symbolic mode
  • Initial permissions using umask
  • Special file bits: SUID and SGID
  • Special directory bits: SGID and Sticky
  • Read access control lists
  • Set access control lists (ACLs)
  • Configure inheritance with default access control lists
  • Delete access control lists
  • Challenge: File access control
  • Solution: File access control
3. Manage Security
  • Set enforcing and permissive modes for SELinux
  • List and identify SELinux file and process context
  • Restore SELinux default file contexts
  • Use Booleans to modify SELinux behavior
  • Diagnose routine SELinux policy violations
  • Maintain security context when managing files
  • Manage firewalls with firewalld
  • Challenge: Manage security
  • Solution: Manage security
4. Accessing Linux Remotely
  • Configure Secure Shell
  • Configure key-based authentication for SSH
  • Securely transfer files between systems
  • Access Linux from Windows using PuTTY
  • Access Linux from macOS or Linux using SSH
  • Access Linux from iOS using SSH
  • Access Linux from Android using SSH
5. Configure Local Storage
  • List, create, and delete partitions on MBR and GPT disks
  • Manage LVM volumes and volume groups
  • Mount file systems at boot
  • Mount file systems at boot by ID or label
  • Extend existing logical volumes
  • Mount and unmount CIFS and NFS network file systems
  • Challenge: Local storage
  • Solution: Local storage
Conclusion
  • Next steps
  • Provider:LinkedIn Learning
  • Certificate:Certificate Available
  • Language:English
  • Duration:3-4 hours worth of material
  • Language CC:

Do You Have Questions ?

We'll help you to grow your career and growth.
Contact Us Today