Redhat Enterprise Linux 9 - EX200 RHCSA
Experienced Red Hat Enterprise Linux system administrators seeking validation of their skills. DevOps professionals who wish to demonstrate their expertise with the fundamentals of container technology. An RHCE who is noncurrent or who is about to become noncurrent and wants to recertify as an RHCE
RHCSA exam candidates should be able to accomplish the tasks below without assistance. These have been grouped into several categories.
Chapter 1: Understand and use essential tools
- Lesson 1.1: Access a shell prompt and issue commands with correct syntax
- Lesson 1.2: Use input-output redirection (>, >>, |, 2>, etc.)
- Lesson 1.3: Use grep and regular expressions to analyze text
- Lesson 1.4: Access remote systems using SSH
- Lesson 1.5: Log in and switch users in multiuser targets
- Lesson 1.6: Archive, compress, unpack, and uncompress files using tar, gzip, and bzip2
- Lesson 1.7: Create and edit text files
- Lesson 1.8: Create, delete, copy, and move files and directories
- Lesson 1.9: Create hard and soft links
- Lesson 1.10: List, set, and change standard ugo/rwx permissions
- Lesson 1.11: Locate, read, and use system documentation including man, info, and files in /usr/share/doc
Chapter 2: Create simple shell scripts
- Lesson 2.1: Conditionally execute code (use of: if, test, [], etc.)
- Lesson 2.2: Use Looping constructs (for, etc.) to process file, command line input
- Lesson 2.3: Process script inputs (2, etc.)
- Lesson 2.4: Processing output of shell commands within a script
Chapter 3: Operate running systems
- Lesson 3.1: Boot, reboot, and shut down a system normally
- Lesson 3.2: Boot systems into different targets manually
- Lesson 3.3: Interrupt the boot process in order to gain access to a system
- Lesson 3.4: Identify CPU/memory intensive processes and kill processes
- Lesson 3.5: Adjust process scheduling
- Lesson 3.6: Manage tuning profiles
- Lesson 3.7: Locate and interpret system log files and journals
- Lesson 3.8: Preserve system journals
- Lesson 3.9: Start, stop, and check the status of network services
- Lesson 3.10: Securely transfer files between systems
Chapter 4: Configure local storage
- Lesson 4.1: List, create, delete partitions on MBR and GPT disks
- Lesson 4.2: Create and remove physical volumes
- Lesson 4.3: Assign physical volumes to volume groups
- Lesson 4.4: Create and delete logical volumes
- Lesson 4.5: Configure systems to mount file systems at boot by universally unique ID (UUID) or label
- Lesson 4.6: Add new partitions and logical volumes, and swap to a system non-destructively
Chapter 5: Create and configure file systems
- Lesson 5.1: Create, mount, unmount, and use vfat, ext4, and xfs file systems
- Lesson 5.2: Mount and unmount network file systems using NFS
- Lesson 5.3: Configure autofs
- Lesson 5.4: Extend existing logical volumes
- Lesson 5.5: Create and configure set-GID directories for collaboration
- Lesson 5.6: Diagnose and correct file permission problems
Chapter 6: Deploy, configure, and maintain systems
- Lesson 6.1: Schedule tasks using at and cron
- Lesson 6.2: Start and stop services and configure services to start automatically at boot
- Lesson 6.3: Configure systems to boot into a specific target automatically
- Lesson 6.4: Configure time service clients
- Lesson 6.5: Install and update software packages from Red Hat Network, a remote repository, or from the local file system
- Lesson 6.6: Modify the system bootloader
Chapter 7: Manage basic networking
- Lesson 7.1: Configure IPv4 and IPv6 addresses
- Lesson 7.2: Configure hostname resolution
- Lesson 7.3: Configure network services to start automatically at boot
- Lesson 7.4: Restrict network access using firewall-cmd/firewall
Chapter 8: Manage users and groups
- Lesson 8.1: Create, delete, and modify local user accounts
- Lesson 8.2: Change passwords and adjust password aging for local user accounts
- Lesson 8.3: Create, delete, and modify local groups and group memberships
- Lesson 8.4: Configure superuser access
Chapter 9: Manage security
- Lesson 9.1: Configure firewall settings using firewall-cmd/firewalld
- Lesson 9.2: Manage default file permissions
- Lesson 9.3: Configure key-based authentication for SSH
- Lesson 9.4: Set enforcing and permissive modes for SELinux
- Lesson 9.5: List and identify SELinux file and process context
- Lesson 9.6: Restore default file contexts
- Lesson 9.7: Manage SELinux port labels
- Lesson 9.8: Use boolean settings to modify system SELinux settings
- Lesson 9.9: Diagnose and address routine SELinux policy violations
Chapter 10: Manage containers
- Lesson 10.1: Find and retrieve container images from a remote registry
- Lesson 10.2: Inspect container images
- Lesson 10.3: Perform container management using commands such as podman and skopeo
- Lesson 10.4: Build a container from a Containerfile
- Lesson 10.5: Perform basic container management such as running, starting, stopping, and listing running containers
- Lesson 10.6: Run a service inside a container
- Lesson 10.7: Configure a container to start automatically as a systemd service
- Lesson 10.8: Attach persistent storage to a container
Reference: Red Hat EX200