RHCSA Essentials


35 hours or 5 classroom days

Course Overview

Our RHCSA course offers both hands on and lecture, allowing students to gain a clear understanding of how RHCSA works and how to properly deploy it though a study of best practices. Check out the outline and note the depth of material this course offers. When you complete this course, you will understand RHCSA. Important linux skills necessary to perform effective CLI tasks are also taught. All hands-on labs are written to reinforce each lesson, making the concepts clearly understood.

Download Detailed Outline

Red Hat Certified System Administrator

5 Days with Hands-on Labs

  1. Learn Basic Linux Tools
  • Access a shell prompt and issue commands with correct syntax
  • Archive, compress, unpack, and uncompress files using tar, star, gzip, and bzip2
  • Create and edit text files
  • Locate, read, and use system documentation including man, info, and files in /usr/share/doc
  • Access remote systems using SSH
  • Intro to the Vim editor

  1. Handling Files and File Permissions
  • Create, delete, copy, and move files and directories
  • Create hard and soft links
  • List, set, and change standard ugo/rwx permissions
  • Create and configure set-GID directories for collaboration.
  • Diagnose and correct file permission problems
  • Modify ownership and group membership

  1. Using SSH and TCP Wrappers to Secure Access
  • Access remote systems using SSH
  • Securely transfer files between systems
  • Configure key-based authentication for SSH

  1. User and Group Management
  • Log in and switch users in multiuser targets
  • Create, delete, and modify local user accounts
  • Change passwords and adjust password aging for local user accounts
  • Create, delete, and modify local groups and group memberships
  • Use su and sudo commands
  • Managing authentication files

  1. Using Processes, Bash Shell, and Scheduling
  • Use input-output redirection (>, >>, |, 2>, etc.)
  • Use grep and regular expressions to analyze text
  • Identify CPU/memory intensive processes, adjust process priority with renice, and kill processes
  • Schedule tasks using at and cron
  • Understand and display system and user executed processes
  • Signals and their use
  • Overview of job scheduling and access control

  1. Setting up RHEL7, Network, and Server Virtualization
  • Access a virtual machine's console
  • Start and stop virtual machines
  • Install Red Hat Enterprise Linux automatically using Kickstart
  • Using KickStart
  • Configure a physical machine to host virtual guests
  • Install Red Hat Enterprise Linux systems as virtual guests
  • Configure systems to launch virtual machines at boot
  • Using an FTP installation server
  • Manage virtual networks, virtual storage, and hypervisor with GUI and commands

  1. Handling Software Packages
  • Install and update software packages from Red Hat Network, a remote repository, or from the local file system
  • Overview of yum repository and how to create one
  • Add, view, update, and remove packages with PackageKit

  1. Logging Messages, Updating Kernels, Booting RHEL7
  • Boot, reboot, and shut down a system normally
  • Boot systems into different targets manually
  • Interrupt the boot process in order to gain access to a system
  • Locate and interpret system log files and journals
  • Start, stop, and check the status of network services
  • Start and stop services and configure services to start automatically at boot
  • Configure systems to boot into a specific target automatically
  • Configure network services to start automatically at boot
  • Update the kernel package appropriately to ensure a bootable system
  • Modify the system bootloader

  1. Managing and Partitioning Disk Storage
  • List, create, and delete partitions on MBR and GPT disks
  • Create and remove physical volumes, assign physical volumes to volume groups, and create and delete logical volumes
  • Add new partitions and logical volumes, and swap to a system non-destructively
  • Extend existing logical volumes
  • Understand LVM concepts, components, and structure

  1. Utilizing Network Interfaces and Clients
  • Basic networking concepts
  • Configure networking and hostname resolution statically or dynamically
  • Configure a system to use time services
  • Configure a system to use an existing authentication service for user and group information

  1. Build and Use File Systems
  • Configure systems to mount file systems at boot by UUID or label
  • Add new partitions and logical volumes and swap to a system non-destructively
  • Create, mount, unmount, and use vfat, ext4, and xfs file systems
  • Create and manage access control lists (ACLs)
  • Mount and unmount CIFS and NFS file systems
  • Understanding file systems

  1. Using Firewall and SELinux to Control Access
  • Configure firewall settings using firewall-config, firewall-cmd, or iptables
  • Set enforcing and permissive modes for SELinux
  • List and identify SELinux file and process context
  • Restore default file contexts
  • Use Boolean settings to modify system SELinux settings
  • Diagnose and address routine SELinux policy violations


Self-paced: $ 495 USD

  • Includes 1 year access to videos
  • 60 day access to hands on labs
  • 3 attempts at practice exam

Live Instructor via the web: $ 2195 USD

  • Live Instructor Led Webinar
  • A teacher to guide you
  • Plus all the self-paced items

Bring us Onsite:

  • Contact us for onsite quotes

Next Public Course Offerings:

  • June 17-21, 2019
  • August 05-09, 2019
  • Testimonials

    Different plans for everyone

    Choose the pricing that fits your business needs

    Live Instructor via the Web
    $ 2195
  • Live Instructor Led Webinar
  • A teacher to guide you
  • Plus all the self-paced items
  • Contact Us

    Contact Us
  • Digital and Printed course materials
  • Hands-on Lab access
  • Includes Certification Exam
  • Plus all the self-paced items
  • Contact Us