RHCE in Multan

RHCE in Multan

Course Details

The Red Hat Certified Engineer course will prepare you for the certification exam from Red Hat. This certification is intended to be earned by a current Red Hat Certified System Administrator (RHCSA). This course will prepare you for the performance based certification exam by Red Hat that is intended to demonstrate your knowledge, skills and experience as a senior system administrator that is responsible for Red Hat Enterprise Linux systems.

Notice: This is not an official Red Hat course created by or approved by Red Hat. The Net Rider is in no away affiliated with Red Hat, inc the company.

Addendum: Bash Scripting is one of the objectives for this certification, but is relatively minor. You should pick up enough knowledge as you work through the course to cover the requirements for the exam. Please see The System Administrator’s Guide to Bash Scripting course for more detailed coverage of this topic: 

Syllabus

Introduction to Red Hat Certified Engineer

Let’s talk about the RHCE, how it differs from its little brother, walk through the course syllabus and then talk about registering and taking the exam.

Introduction to RHCE

Course Syllabus

Registering for the Exam

Taking the Exam

RHEL 8 Update Information

System configuration and management

Use Network Teaming or Bonding to Configure Aggregated Network Links Between Two Red Hat Enterprise Linux Systems or Interfaces

Configure IPv6 Addresses and Perform Basic IPv6 Troubleshooting

Route IP Traffic and Create Static Routes

Use Firewalld and Associated Mechanisms Such as Rich Rules, Zones and Custom Rules, to Implement Packet Filtering and Configure Network Address Translation (NAT) – Part I

Use Firewalld and Associated Mechanisms Such as Rich Rules, Zones and Custom Rules, to Implement Packet Filtering and Configure Network Address Translation (NAT) – Part II

Use /proc/sys and sysctl to Modify and Set Kernel Runtime Parameters

Configure a System to Authenticate Using Kerberos – KDC Server Setup

Configure a System to Authenticate Using Kerberos – Client Setup

Configure a System as Either an iSCSI Target or Initiator That Persistently Mounts an iSCSI Target – Target Setup

Configure a System as Either an iSCSI Target or Initiator That Persistently Mounts an iSCSI Target – Initiator Setup

Produce and Deliver Reports on System Utilization (Processor, Memory, Disk, and Network)

Exercise: Produce and Deliver Reports on System Utilization

Hands-on Labs are real live environments that put you in a real scenario to practice what you have learned without any other extra charge or account to manage.

Configure IPv6 Addresses

Hands-on Labs are real live environments that put you in a real scenario to practice what you have learned without any other extra charge or account to manage.

Route IP Traffic by Creating Static Routes

Hands-on Labs are real live environments that put you in a real scenario to practice what you have learned without any other extra charge or account to manage.

Use Network Teaming or Bonding to Configure Aggregated Network Links Between Two Red Hat Enterprise Linux Systems

Hands-on Labs are real live environments that put you in a real scenario to practice what you have learned without any other extra charge or account to manage.

Configure a System to Authenticate Using Kerberos

Hands-on Labs are real live environments that put you in a real scenario to practice what you have learned without any other extra charge or account to manage.

Configure an iSCSI Target and Initiator

System configuration and management

Network Services

Section Overview

Install the Packages Needed to Provide the Service

Configure SELinux to Support the Service

Use SELinux Port Labeling to Allow Services to Use Non-Standard Ports

Configure the Service to Start When the System is Booted

Configure the Service for Basic Operation

Configure Host-Based and User-Based Security for the Service

Exercise: Configure and Use SELinux to Support Services

Exercise: Configure a Service to Start When the System is Booted

 

HTTP/HTTPS

Install and Configure Apache

The Apache Configuration File – A Walk Through

Configure Private Directories

Configure Group Managed Content

Configure a Virtual Host

Deploy a basic CGI application

Configure TLS Security – Generating Key Files, CSRs and Self Signed Certificates

Configure TLS security – Configuring the Virtual Host

 

Exercise: Install and Configure Apache

Exercise: Configure a Virtual Host

 

DNS

Configure a Caching-Only Name Server

Troubleshoot DNS Client Issues

 

NFS

Provide Network Shares to Specific Clients – Server Installation and Configuration

Provide Network Shares to Specific Clients – Client Installation and Configuration

Provide Network Shares Suitable for Group Collaboration

Use Kerberos to Control Access to NFS Network Shares – Quick NFS Setup

Use Kerberos to Control Access to NFS Network Shares – Kerberos NFS Server and Client

Exercise: Provide Network Shares to Specific Clients – Server Setup

Exercise: Provide Network Shares to Specific Clients – Client Setup

 

Hands-on Labs are real live environments that put you in a real scenario to practice what you have learned without any other extra charge or account to manage.

Use Kerberos to Control Access to NFS Shares

 

SMB

Provide Network Shares to Specific Clients – Server Installation and Configuration

Provide Network Shares to Specific Clients – Client Installation and Configuration

Provide Network Shares Suitable for Group Collaboration

 

SMTP

Configure a System to Forward All Email to a Central Mail Server – Setup

Configure a System to Forward All Email to a Central Mail Server – Client Testing

Hands-on Labs are real live environments that put you in a real scenario to practice what you have learned without any other extra charge or account to manage.

Configure a System to Forward All Email to a Central Mail Server

Exercise: Configure a System to Forward All Email to a Central Mail Server

 

SSH

Configure Key-Based Authentication

Configure Additional Options Described in Documentation

Exercise: Configure Key-Based Authentication

 

NTP

Synchronize Time Using Other NTP Peers – Set Up Local Time Server

Synchronize Time Using Other NTP Peers – Peer with New Time Server

 

Database Services

Install and Configure MariaDB

Install and Configure Local and Remote MariaDB Clients

Create a Simple Database Schema

Perform Simple SQL Queries Against a Database

Backup and Restore a Database – Backups

Backup and Restore a Database – Restore

Exercise: Install and Configure MariaDB

 

Preparing For The Exam

How to Practice and Study After Completing the Course

Summary and Next Steps

 

Leave a Reply

Your email address will not be published. Required fields are marked *