-
- Basics commands
- Input/Output Redirection
- Regular Expressions
- Access remote system using ssh
- Logs and switch users in multiuser targets
- Archive, Compress, Unpack and Uncompress files using tar, star, gzip and bzip2
- Create and edit text files
- Create, delete, copy and move files and directories
- Create hard and soft links
- List, set and change standard UGO/RWX Permissions
- List, set and change standard UGO/RWX Permissions: unmask
- Locate, Read and Use System Documentation with man, info and /usr/share/doc
- Finding Files with Locate and Find
-
- Boot, Reboot and Shutdown a System
- Boot Systems into Different Targets Manually
- Interrupt the Boot Process to Gain Access to a System
- Adjust Process Priority and Kill Processes - Part 1
- Adjust Process Priority and Kill Processes - Part 2
- Adjust Process Priority and Kill Processes - Part 3
- Adjust Process Priority and Kill Processes - Part 4
- Locate and Interpret System Log Files and Journals
-
- Configure Networking and Hostname Resolution Statically or Dynamically: Troubles
- Networking and Hostname Resolution Statically or Dynamically: Network Manager
- Network/Hostname Resolution Statically or Dynamically: Hostname Configuration
- Schedule Tasks Using at and cron
- Start and Stop Services and Configure Services to Start Automatically at Boot
- Configure Systems to Boot into a Specific Target Automatically
- Install Red Hat Enterprise Linux Automatically Using Kickstart
- Configure a Physical Machine to Host Virtual Guests
- Install Red Hat Enterprise Linux Systems as Virtual Guests
- Configure Systems to Launch Virtual Machines at Boot
- Configure Network Services to Start Automatically at Boot
- Configure a System to Use Time Services
- Install and Update Software Packages from Red Hat Network, YUM REPO
- Install and Update Software Packages from Red Hat Network, RPM REPO
- Managing Repositories
- Configuring a Local Repository
- Configuring a Local Repository: Configure the GPG Key
- Update the Kernel Package Appropriately to Ensure a Bootable System
- Modifying the System Bootloader
-
- Configure Firewall Settings Using Available Firewall Utilities.
- Configure Key-Based Authentication for SSH
- Introduction to SELinux
- Set Enforcing and Permissive Modes for SELinux
- List and Identify SELinux Files and Process Contexts
- Restore Default File Contexts
- Use Boolean Settings to Modify System SELinux Settings
- Diagnose and Address Routine SELinux Policy Violations
walidhegazy / rhcsa-notes Goto Github PK
View Code? Open in Web Editor NEWThis project forked from ivanmorenoj/rhcsa-notes
Red Hat Certified System Administrator Notes