Sie sind auf Seite 1von 154

Comprehensive, hands-on training that solves real-world problems

Red Hat System Administration III

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


DAY ONE DAY TWO DAY THREE DAY FOUR

Network Port
File-based Bash Scripts
Introduction Security
Storage
(continued)

Services and MariaDB Bash Control


DNS Structures
Daemons Databases

Shell
IPv6 Networking Email Apache HTTPD Environment

Link Aggregation Block-based Comprehensive


and Bridging Storage Review

Network Port
Security

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


DAY ONE
Introduction
Introduction

Services and Welcome to Class


Daemons
Course Objectives and
IPv6 Networking Structure

Link Aggregation
Orientation to Classroom
and Bridging Network
Internationalization
Network Port Security

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Welcome to Class

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Course Objectives and Structure

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


DAY ONE DAY TWO DAY THREE DAY FOUR

Network Port
File-based Bash Scripts
Introduction Security
Storage
(continued)

Services and MariaDB Bash Control


DNS Structures
Daemons Databases

Shell
IPv6 Networking Email Apache HTTPD Environment

Link Aggregation Block-based Comprehensive


and Bridging Storage Review

Network Port
Security

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Orientation to Classroom Network

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Internationalization

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


DAY ONE Chapter 1:
Controlling Services and
Introduction
Daemons
Services and Controlling Services with
Daemons
systemctl
IPv6 Networking Controlling the Boot Process

Link Aggregation
Reviewing the System Logs
and Bridging and Journal

Network Port Security

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Goal:

To review how to manage services and the boot-up process


using systemctl.

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Objectives:

Manage how systemd starts up system daemons and


network services, using systemctl.
Control and troubleshoot system boot using systemd
targets.
Troubleshoot issues using log messages in /var/log and
the systemd journal.

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Controlling Services with systemctl

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Practice:
Using systemctl to Manage
Services

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Controlling the Boot Process

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Practice:
Selecting a Boot Target

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Reviewing the System Logs and Journal

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Practice:
Finding Events With journalctl

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Lab:
Controlling Services and Daemons

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


DAY ONE Chapter 2:
Managing IPv6
Introduction
Networking
Services and Review of IPv4 Networking
Daemons
Configuration
IPv6 Networking IPv6 Networking Concepts

Link Aggregation
IPv6 Networking
and Bridging Configuration

Network Port Security

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Goal:

To configure and troubleshoot basic IPv6 networking on Red


Hat Enterprise Linux systems.

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Objectives:

Review how to configure IPv4 networking in RHEL 7


Explain the basic concepts of IPv6 networking and read
and write condensed IPv6 addresses
Configure IPv6 networking using command-line tools and
configuration files

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Review of IPv4 Networking Configuration

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Practice:
Configuring IPv4 Networking

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


IPv6 Networking Concepts

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.
Quiz:
Interpreting IPv6 Addresses

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


IPv6 Networking Configuration

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Practice:
Configuring IPv6 Networking

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Lab:
Managing IPv6 Networking

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


DAY ONE
Chapter 3:
Configuring Link Aggregation and
Introduction Bridging
Services and Configuring Channel Bonding
Daemons
Configuring Network Teaming
IPv6 Networking Managing Network Teaming
Link Aggregation Configuring Software Bridges
and Bridging

Network Port Security

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Goal:

To configure and troubleshoot advanced network interface


functionality, including bonding, teaming, and local software
bridges.

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Objectives:

Use channel bonding to provide network link redundancy


or higher throughput.
Use network teaming to provide link redundancy or higher
throughput.
Manage a network team interface.
Manage local software bridges and associated interfaces.

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Configuring Channel Bonding

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Practice:
Configuring Channel Bonding

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Configuring Network Teaming

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Practice:
Configuring Network Teaming

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Managing Network Teaming

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Practice:
Managing Network Teaming

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Configuring Software Bridges

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Practice:
Configuring Software Bridges

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Lab:
Configuring Link Aggregation
and Bridging

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


DAY ONE
Chapter 4:
Introduction Network Port Security
Services and
Daemons Managing Firewalld
Managing Rich Rules
IPv6 Networking
Masquerading and Port Forwarding
Link Aggregation Adding Custom firewalld Zones and
and Bridging Services
Network Port Security Managing SELinux Port Labeling

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Goal:

To permit and reject access to network services using


advanced SELinux and firewalld filtering techniques.

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Objectives:
Review firewalld concepts and management commands
covered in previous courses.
Configure more complex firewall configurations using
firewalld's support for "rich language rules."
Describe and implement Network Address Translation
(NAT).
Customize and create predefined firewalld services and
zones to simplify configuration.
Ensure network ports have the correct SELinux type so
that services are able to bind to them.

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Managing Firewalld

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Practice:
Configuring a Firewall

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Managing Rich Rules

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Practice:
Writing Custom Rules

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Masquerading and Port Forwarding

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.
Practice:
Forwarding a Port

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Adding Custom firewalld Zones and Services

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Practice:
Configure a Custom Firewall

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Managing SELinux Port Labeling

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Practice:
Managing SELinux Port Labeling

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Lab:
Network Port Security

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


DAY TWO
Chapter 5:
DNS Managing DNS for Servers
Email DNS Concepts
Configuring a Caching
Block-based Storage Nameserver
DNS Troubleshooting

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Goal:

To set and verify correct DNS records for systems and


configure secure caching DNS name service.

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Objectives:

Explain how DNS is used to resolve names and addresses


and the purpose of key DNS resource records.
Configure unbound to act as a secure local caching
nameserver.
Describe common DNS configuration problems and how to
identify and resolve them.

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


DNS Concepts

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Quiz:
DNS Resource Record

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Configuring a Caching Nameserver

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Practice:
Configuring unbound as a
Caching Nameserver

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


DNS Troubleshooting

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Practice:
Troubleshooting DNS

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Lab:
Managing DNS for Servers

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


DAY TWO Chapter 6:
Configuring Email
DNS
Transmission
Email Email Overview
Configuring a Send-only Email
Block-based Storage Configuration
Configuring Send-only Email with
Mail Submission Agents

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Goal:

To relay all email sent by the system through an SMTP


gateway.

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Objectives:

Explain how email messages are sent and read by Linux


mail clients.
Configure a Red Hat Enterprise Linux server to transmit
all email through an unauthenticated SMTP gateway.
Configure a Red Hat Enterprise Linux server to
transmit all email through an SMTP gateway requiring
authentication.

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Email Overview

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.
Practice:
Sending Email with Telnet

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Configuring a Send-only Email Configuration

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.
Practice:
Configuring a Send-only Email
Configuration

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Configuring Send-only Email with Mail
Submission Agents

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Practice:
Configuring Send-only Email with
Mail Submission Agents

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Lab:
Configuring Email Transmission

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


DAY TWO Chapter 7:
Providing Remote Block
DNS
Storage
Email iSCSI Concepts
Providing iSCSI Targets
Block-based Storage
Accessing iSCSI Storage

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Goal:

To provide and use networked iSCSI block devices as remote


disks.

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Objectives:

Explain at a high level how iSCSI is used to provide remote


access to block devices.
Provide remote access using a local disk as a LUN of an
iSCSI storage target.
Access remote storage using an iSCSI initiator and
prepare it for use.

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


iSCSI Concepts

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.
RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.
RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.
RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.
Quiz:
iSCSI Concepts

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Providing iSCSI Targets

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Practice:
Providing iSCSI Targets

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Accessing iSCSI Storage

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Practice:
Accessing iSCSI Storage

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Lab:
Providing Block-based Storage

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


DAY THREE Chapter 8:
File-based Storage
Providing File-based
Storage
MariaDB
Databases Exporting NFS File Systems

Apache HTTPD
Protecting NFS Exports
Providing SMB File Shares
Performing a Multiuser SMB
Mount

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Goal:

To provide NFS exports and SMB file shares to specific


systems and users.

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Objectives:
Export file systems to client systems using NFS,
controlling access by IP address.
Export file systems to clients using NFS, controlling
access with Kerberos and using labeled NFS.
Share file systems with clients using SMB, controlling
access by username and password.
Mount an SMB share with the multiuser mount option,
using password-based authentication and cifscreds to
control access

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Exporting NFS File Systems

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Practice:
Exporting NFS File Systems

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Protecting NFS Exports

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Practice:
Protecting NFS Exports

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Providing SMB File Shares

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Practice:
Providing SMB File Shares

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Performing a Multiuser SMB Mount

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Practice:
Performing a Multiuser SMB Mount

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Lab:
Providing File-based Storage

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


DAY THREE Chapter 9:
File-based Storage
Configuring MariaDB
Databases
MariaDB
Databases Installing MariaDB

Apache HTTPD
Working with MariaDB
Databases
Managing Database Users and
Access Rights
Creating and Restoring MariaDB
Backups

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Goal:

To provide a MariaDB SQL database for use by programs and


database administrators.

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Objectives:

Install MariaDB.
Configure and administer MariaDB.
Configure user and access rights.
Back up and restore MariaDB databases.

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Installing MariaDB

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.
Practice:
Installing MariaDB

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Working with MariaDB Databases

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Quiz:
MariaDB Commands

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Managing Database Users and Access Rights

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Practice: Managing Users

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Creating and Restoring MariaDB Backups

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Practice:
Restoring a MariaDB Database
from Backup

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Lab:
Configuring MariaDB Databases

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


DAY THREE Chapter 10:
File-based Storage
Providing Apache HTTPD
Web Service
MariaDB
Databases Configuring Apache HTTPD

Apache HTTPD
Configuring and Troubleshooting
Virtual Hosts
Configuring HTTPS
Integrating Dynamic Web
Content

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Goal:

To configure Apache HTTPD to provide TLS-enabled


websites and virtual hosts.

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Objectives:

Identify the key configuration files, log files, and content


directories used by Apache HTTPD.
Configure Apache HTTPD to provide IP-based and namebased
virtual hosts.
Configure Apache HTTPD to provide TLS-encrypted virtual
hosts.
Configure Apache HTTPD to serve dynamic databasedriven
web content.

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Configuring Apache HTTPD

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Practice:
Configuring a Web Server

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Configuring and Troubleshooting
Virtual Hosts

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Practice:
Configuring a Virtual Host

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Configuring HTTPS

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.
Practice:
Configuring a TLS-enabled
Virtual Host

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Integrating Dynamic Web Content

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Practice:
Configuring a Web Application

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Lab:
Providing Apache HTTPD Web Service

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


DAY FOUR
Chapter 11:
Bash Scripts Writing Bash Basics
Bash Control
Structures Bash Shell Scripting Basics

Shell Environment

Comprehensive
Review

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Goal:

To write simple, well-structured shell scripts using Bash's


shell expansion features and for-loop construct.

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Objectives:

To write simple shell scripts using Bash.

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Bash Shell Scripting Basics

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Practice:
Writing Bash Scripts

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Lab:
Writing Bash Scripts

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


DAY FOUR Chapter 12:
Bash Scripts
Bash Conditionals and
Control Structures
Bash Control
Structures Bash Condition Evaluation and
Control Structures
Shell Environment

Comprehensive
Review

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Goal:

To use Bash conditionals and other control structures to


write more sophisticated shell commands and scripts.

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Objectives:

Incorporate the use of positional parameters, exit status,


test conditions, and conditional structures to implement
flow control in Bash shell scripts.

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Enhancing Bash Shell Scripts with
Conditionals and Control Structures

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Practice:
Enhancing Bash Shell Scripts with
Conditionals and Control Structures

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Lab:
Bash Conditionals and Control Structures

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


DAY FOUR Chapter 13:
Bash Scripts
Configuring the Shell
Environment
Bash Control
Structures Changing the Shell Environment

Shell Environment

Comprehensive
Review

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Goal:

To customize Bash startup and use environment variables,


Bash aliases, and Bash functions.

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Objectives:

Use bash startup scripts to define environment variables,


aliases, and functions

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Changing the Shell Environment

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Practice:
Working with Login and Non-Login
Shells

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Lab:
Configuring the Shell Environment

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


DAY FOUR
Chapter 14:
Bash Scripts Comprehensive Review
Bash Control
Structures Red Hat System Administration III
Comprehensive Review
Shell Environment

Comprehensive
Review

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Goal:

To practice and demonstrate knowledge and skills learned in


Red Hat System Administration III.

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Objectives:

Review the course chapters to reinforce knowledge and


skills.

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Red Hat System Administration III
Comprehensive Review

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


Lab:
Comprehensive Review of System
Administration III

RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.


RH254-RHEL7-en-2-20150427 Copyright 2015 Red Hat, Inc.