Upload
duongcong
View
228
Download
4
Embed Size (px)
Citation preview
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Comprehensive, hands-on training that solves real-world problems
Red Hat System Administration III
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
DAY ONE
Services andDaemons
IPv6 Networking
Link Aggregationand Bridging
DAY TWO
Network PortSecurity
Introduction DNS
DAY ONE DAY THREE
Block-basedStorage
File-basedStorage
(continued)
MariaDBDatabases
DAY FOUR
Apache HTTPD
Bash Scripts
Bash ControlStructures
ShellEnvironment
Containers
ComprehensiveReview
File-basedStorage
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Introduction
● Welcome to Class
● Course Objectives and Structure
● Orientation to Classroom Network
● Internationalization
Introduction
DAY ONE
Services and Daemons
IPv6 Networking
Link Aggregationand Bridging
Network Port Security
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Welcome to Class
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Course Objectives and Structure
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
DAY ONE
Services andDaemons
IPv6 Networking
Link Aggregationand Bridging
DAY TWO
Network PortSecurity
Introduction DNS
DAY ONE DAY THREE
Block-basedStorage
File-basedStorage
(continued)
MariaDBDatabases
DAY FOUR
Apache HTTPD
Bash Scripts
Bash ControlStructures
ShellEnvironment
Containers
ComprehensiveReview
File-basedStorage
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Orientation to Classroom Network
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Internationalization
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Chapter 1:Controlling Services and Daemons
● Controlling Services with systemctl
● Controlling the Boot Process
Introduction
DAY ONE
Services and Daemons
IPv6 Networking
Link Aggregationand Bridging
Network Port Security
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
To review how to manage services and the boot-up processusing systemctl.
Goal:
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
● Manage how systemd starts up system daemons andnetwork services, using systemctl.
● Control and troubleshoot system boot using systemdtargets.
Objectives:
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Controlling Services with systemctl
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Practice:Using systemctl to Manage
Services
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Controlling the Boot Process
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Practice:Selecting a Boot Target
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Lab:Controlling Services and Daemons
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Chapter 2:Managing IPv6 Networking
● Review of IPv4 Networking Configuration
● IPv6 Networking Concepts
● IPv6 Networking Configuration
Introduction
DAY ONE
Services and Daemons
IPv6 Networking
Link Aggregationand Bridging
Network Port Security
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
To configure and troubleshoot basic IPv6 networking on RedHat Enterprise Linux systems.
Goal:
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
● Review how to configure IPv4 networking in RHEL 7● Explain the basic concepts of IPv6 networking and read
and write condensed IPv6 addresses● Configure IPv6 networking using command-line tools and
configuration files
Objectives:
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Review of IPv4 Networking Configuration
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Practice:Configuring IPv4 Networking
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
IPv6 Networking Concepts
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Quiz:Interpreting IPv6 Addresses
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
IPv6 Networking Configuration
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Practice:Configuring IPv6 Networking
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Lab:Managing IPv6 Networking
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Chapter 3:Configuring Link Aggregation and Bridging
● Configuring Network Teaming
● Managing Network Teaming
● Configuring Software Bridges
Introduction
DAY ONE
Services and Daemons
IPv6 Networking
Link Aggregationand Bridging
Network Port Security
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
To configure and troubleshoot advanced network interfacefunctionality, including bonding, teaming, and local softwarebridges.
Goal:
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
● Use network teaming to provide link redundancy or higherthroughput.
● Manage a network team interface.● Manage local software bridges and associated interfaces.
Objectives:
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Configuring Network Teaming
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Practice:Configuring Network Teaming
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Managing Network Teaming
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Practice:Managing Network Teaming
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Configuring Software Bridges
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Practice:Configuring Software Bridges
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Lab:Configuring Link Aggregation
and Bridging
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Chapter 4:Network Port Security
● Managing Firewalld
● Managing Rich Rules
● Masquerading and Port Forwarding
● Managing SELinux Port Labeling
DAY ONE
Introduction
Services and Daemons
IPv6 Networking
Link Aggregationand Bridging
Network Port Security
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
To permit and reject access to network services usingadvanced SELinux and firewalld filtering techniques.
Goal:
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
● Review firewalld concepts and management commandscovered in previous courses.
● Configure more complex firewall configurations usingfirewalld's support for "rich language rules."
● Describe and implement Network Address Translation(NAT).
● Ensure network ports have the correct SELinux type sothat services are able to bind to them.
Objectives:
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Managing Firewalld
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Practice:Configuring a Firewall
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Managing Rich Rules
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Practice:Writing Custom Rules
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Masquerading and Port Forwarding
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Practice:Forwarding a Port
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Managing SELinux Port Labeling
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Practice:Managing SELinux Port Labeling
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Lab:Network Port Security
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Chapter 5:Managing DNS for Servers
● DNS Concepts
● Configuring a Caching Nameserver
● DNS Troubleshooting
DAY TWO
DNS
Block-based Storage
File-based Storage
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
To set and verify correct DNS records for systems andconfigure secure caching DNS name service.
Goal:
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
● Explain how DNS is used to resolve names and addressesand the purpose of key DNS resource records.
● Configure unbound to act as a secure local cachingnameserver.
● Describe common DNS configuration problems and how toidentify and resolve them.
Objectives:
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
DNS Concepts
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Quiz:DNS Resource Record
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Configuring a Caching Nameserver
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Practice:Configuring unbound as a
Caching Nameserver
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
DNS Troubleshooting
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Practice:Troubleshooting DNS
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Lab:Managing DNS for Servers
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Chapter 6:Configuring Email Transmission
● Configuring Send-only Email Service
DAY TWO
DNS
Block-based Storage
File-based Storage
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
To relay all email sent by the system through an SMTPgateway.
Goal:
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
● Configure a Red Hat Enterprise Linux server to transmitall email through an unauthenticated SMTP gateway.
Objectives:
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Configuring Send-only Email Service
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Practice:Configuring Send-only Email
Service
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Lab:Configuring Email Transmission
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Chapter 7:Providing Remote Block Storage
● iSCSI Concepts
● Providing iSCSI Targets
● Accessing iSCSI Storage
DAY TWO
DNS
Block-based Storage
File-based Storage
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
To provide and use networked iSCSI block devices as remotedisks.
Goal:
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
● Explain at a high level how iSCSI is used to provide remoteaccess to block devices.
● Provide remote access using a local disk as a LUN of aniSCSI storage target.
● Access remote storage using an iSCSI initiator andprepare it for use.
Objectives:
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
iSCSI Concepts
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Quiz:iSCSI Concepts
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Providing iSCSI Targets
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Practice:Providing iSCSI Targets
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Accessing iSCSI Storage
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Practice:Accessing iSCSI Storage
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Lab:Providing Block-based Storage
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Chapter 8:Providing File-based Storage
● Exporting NFS File Systems
● Protecting NFS Exports
● Providing SMB File Shares
● Performing a Multiuser SMB Mount
DAY TWO
DNS
Block-based Storage
File-based Storage
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
To provide NFS exports and SMB file shares to specificsystems and users.
Goal:
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
● Export file systems to client systems using NFS,controlling access by IP address.
● Export file systems to clients using NFS, controllingaccess with Kerberos and using labeled NFS.
● Share file systems with clients using SMB, controllingaccess by username and password.
● Mount an SMB share with the multiuser mount option,using password-based authentication and cifscreds tocontrol access
Objectives:
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Exporting NFS File Systems
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Practice:Exporting NFS File Systems
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Protecting NFS Exports
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Practice:Protecting NFS Exports
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Chapter 8:Providing File-based Storage
● Exporting NFS File Systems
● Protecting NFS Exports
● Providing SMB File Shares
● Performing a Multiuser SMB Mount
DAY THREE
File-based Storage(continued)
Apache HTTPD
MariaDBDatabases
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Providing SMB File Shares
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Practice:Providing SMB File Shares
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Performing a Multiuser SMB Mount
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Practice:Performing a Multiuser SMB Mount
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Lab:Providing File-based Storage
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Chapter 9:Configuring MariaDB Databases
● Installing MariaDB
● Working with MariaDB Databases
● Managing Database Users and Access Rights
● Creating and Restoring MariaDB Backups
DAY THREE
File-based Storage
Apache HTTPD
MariaDBDatabases
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
To provide a MariaDB SQL database for use by programs anddatabase administrators.
Goal:
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
● Install MariaDB.● Configure and administer MariaDB.● Configure user and access rights.● Back up and restore MariaDB databases.
Objectives:
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Installing MariaDB
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Practice:Installing MariaDB
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Working with MariaDB Databases
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Quiz:MariaDB Commands
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Managing Database Users and Access Rights
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Practice: Managing Users
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Creating and Restoring MariaDB Backups
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Practice:Restoring a MariaDB Database
from Backup
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Lab:Configuring MariaDB Databases
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Chapter 10:Providing Apache HTTPD Web Service
● Configuring Apache HTTPD
● Configuring and Troubleshooting Virtual Hosts
● Configuring HTTPS
● Integrating Dynamic Web Content
DAY THREE
File-based Storage
Apache HTTPD
MariaDBDatabases
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
To configure Apache HTTPD to provide TLS-enabledwebsites and virtual hosts.
Goal:
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
● Identify the key configuration files, log files, and contentdirectories used by Apache httpd.
● Configure Apache httpd to provide IP-based and namebasedvirtual hosts.
● Configure Apache httpd to provide TLS-encrypted virtualhosts.
● Configure Apache httpd to serve dynamic databasedrivenweb content.
Objectives:
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Configuring Apache HTTPD
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Practice:Configuring a Web Server
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Configuring and TroubleshootingVirtual Hosts
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Practice:Configuring a Virtual Host
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Configuring HTTPS
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Practice:Configuring a TLS-enabled
Virtual Host
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Integrating Dynamic Web Content
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Practice:Configuring a Web Application
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Lab:Providing Apache HTTPD Web Service
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Chapter 11:Writing Bash Basics
● Bash Shell Scripting Basics
DAY FOUR
Shell Environment
Containers
ComprehensiveReview
Bash Scripts
Bash ControlStructures
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
To write simple, well-structured shell scripts using Bash'sshell expansion features and for-loop construct.
Goal:
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
● To write simple shell scripts using Bash.
Objectives:
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Bash Shell Scripting Basics
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Practice:Writing Bash Scripts
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Lab:Writing Bash Scripts
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Chapter 12:Bash Conditionals and Control Structures
● Bash Condition Evaluation and Control Structures
DAY FOUR
Shell Environment
Containers
ComprehensiveReview
Bash Scripts
Bash ControlStructures
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
To use Bash conditionals and other control structures towrite more sophisticated shell commands and scripts.
Goal:
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
● Incorporate the use of positional parameters, exit status,test conditions, and conditional structures to implementflow control in Bash shell scripts.
Objectives:
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Enhancing Bash Shell Scripts withConditionals and Control Structures
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Practice:Enhancing Bash Shell Scripts with
Conditionals and Control Structures
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Lab:Bash Conditionals and Control Structures
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Chapter 13:Configuring the Shell Environment
● Changing the Shell Environment
Shell Environment
DAY FOUR
Containers
ComprehensiveReview
Bash Scripts
Bash ControlStructures
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
To customize Bash startup and use environment variables,Bash aliases, and Bash functions.
Goal:
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
● Use bash startup scripts to define environment variables,aliases, and functions
Objectives:
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Changing the Shell Environment
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Practice:Working with Login and Non-Login
Shells
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Lab:Configuring the Shell Environment
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Chapter 14:Linux Containers and Docker
● Introduction to Linux Containers
● Using Docker
DAY FOUR
Shell Environment
Containers
ComprehensiveReview
Bash Scripts
Bash ControlStructures
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
To manage Linux containers with Docker in Red HatEnterprise Linux 7.
Goal:
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
● Explain what Linux containers are and Docker's role inmanaging them
● Manage Linux containers using Docker
Objectives:
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Introduction to Linux Containers
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Using Docker
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Chapter 15:Comprehensive Review
● Red Hat System Administration III Comprehensive Review
DAY FOUR
Shell Environment
Containers
ComprehensiveReview
Bash Scripts
Bash ControlStructures
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
To practice and demonstrate knowledge and skills learned inRed Hat System Administration III.
Goal:
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
● Review the course chapters to reinforce knowledge andskills.
Objectives:
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Red Hat System Administration IIIComprehensive Review
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711
Lab:Comprehensive Review of System
Administration III
Copyright © 2014 Red Hat, Inc.RH254-RHEL7-en-1-20140711