DAY ONE Chapter 1: Accessing the Command Introduction Line Command Line ● Using the Local Console ● Using the Desktop Managing Files ● Using the BASH Shell
DAY ONE Chapter 2: Managing Files From the Introduction Command Line Command Line ● The Linux File System Hierarchy ● Locating Files by Name Managing Files ● Managing Files Using Command-Line Tools Getting Help ● Matching File Names Using Path Name Expansion
● Identify the purpose for important directories on a Linux
system. ● Specify files using absolute and relative path names. ● Create, copy, move, and remove files and directories using command-line utilities. ● Match one or more file names using shell expansion as arguments to shell commands.
DAY ONE Chapter 3: Getting Help in Red Hat Introduction Enterprise Linux Command Line ● Reading Documentation Using man Command Managing Files ● Reading Documentation Using pinfo Command Getting Help ● Reading Documentation in /usr/share/doc ● Getting Help From Red Hat
DAY TWO Chapter 4: Working with Creating, Viewing, and Text Files Editing Text Files Local Users ● Redirecting Output to a File or and Groups Program Permissions ● Editing Text Files from the Shell Prompt Processes ● Editing Text Files with a Graphical Editor
● Redirect the text output of a program to a file or to another
program. ● Edit existing text files and create new files from the shell prompt with a text editor. ● Copy text from a graphical window to a text file using a text editor running in the graphical environment.
DAY TWO Chapter 5: Working with Managing Local Linux Text Files Users and Groups Local Users ● Users and Groups and Groups ● Gaining Superuser Access Permissions ● Managing Local User Accounts Processes ● Managing Local Group Accounts ● Managing User Passwords
● Explain the role of users and groups on a Linux system and
how they are understood by the computer. ● Run commands as the superuser to administer a Linux system. ● Create, modify, lock, and delete locally defined user accounts. ● Create, modify, and delete locally defined group accounts. ● Lock accounts manually or by setting a password-aging policy in the shadow password file.
DAY TWO Chapter 6: Controlling Access to Files Working with with Linux File System Text Files Permissions Local Users ● Linux File System Permissions and Groups ● Managing File System Permissions Permissions from the Command Line Processes ● Managing Default Permissions and File Access
● Explain how the Linux file permissions model works.
● Change the permissions and ownership of files using command-line tools. ● Configure a directory in which newly created files are automatically writable by members of the group which owns the directory, using special permissions and default umask settings.
DAY TWO Chapter 7: Working with Monitoring and Managing Text Files Linux Processes Local Users ● Processes and Groups ● Controlling Jobs Permissions ● Killing Processes Processes ● Monitoring Process Activity
● List and interpret basic information about processes running
on the system. ● Control processes in the shell's session using bash job control. ● Terminate and control processes using signals. ● Monitor resource usage and system load due to process activity.
DAY THREE Chapter 8: Controlling Services and Processes Daemons Services ● Identifying Automatically Started System Processes OpenSSH ● Controlling System Services
DAY THREE Chapter 9: Configuring and Securing Processes OpenSSH Service Services ● Accessing the Remote Command Line with SSH OpenSSH ● Configuring SSH Key-based Authentication Logs ● Customizing SSH Service Configuration
● Log into a remote system using ssh to run commands from a
shell prompt. ● Set up ssh to allow secure password-free logins by using a private authentication key file. ● Customize sshd configuration to restrict direct logins as root or to disable password-based authentication.
DAY THREE Chapter 10: Analyzing and Storing Processes Logs Services ● System Log Architecture ● Reviewing Syslog Files OpenSSH ● Reviewing systemd Journal Entries Logs ● Preserving the systemd Journal ● Maintaining Accurate Time
Objectives: ● Describe the basic syslog architecture in Red Hat Enterprise Linux 7. ● Interpret entries in relevant syslog files to troubleshoot problems or review system status. ● Find and interpret log entries in the systemd journal to troubleshoot problems or review system status. ● Configure systemd-journald to store its journal on disk rather than in memory. ● Maintain accurate time synchronization and time zone configuration to ensure correct timestamps in system logs.
DAY FOUR Chapter 11: Managing Red Hat Linux Networking Enterprise Networking Archiving Files Networking Concepts Validating Network Configuration Software Packages Configuring Networking with nmcli Editing Network Configuration Files Configuring hostnames and Name Resolution
● Explain fundamental concepts of computer networking.
● Test and review current network configuration with basic utilities. ● Manage network settings and devices with nmcli and NetworkManager. ● Modify network settings by editing the configuration files. ● Configure and test system hostname and name resolution.
DAY FOUR Chapter 12: Archiving and Copying Networking Files Between Systems Archiving Files ● Managing Compressed tar Archives Software Packages ● Copying Files Between Systems Securely ● Synchronizing Files Between Systems Securely
● Use tar to create new compressed archive files and extract
files from existing archive files. ● Copy files securely to or from a remote system running sshd. ● Securely synchronize the contents of a local file or directory with a remote copy.
Objectives: ● Register systems with your Red Hat account and entitle them to software updates for installed products. ● Explain what an RPM package is and how RPM packages are used to manage software on a Red Hat Enterprise Linux system. ● Find, install, and update software packages using the yum command. ● Enable and disable use of Red Hat or third-party YUM repositories. ● Examine and install downloaded software package files.
DAY FIVE Chapter 14: Accessing Linux File File System Systems Virtualized Systems ● Identifying File Systems and Devices Review ● Mounting and Unmounting File Systems ● Making Links between Files ● Locating Files on the System
Node - Js Web Development For Beginners A Step-By-Step Guide To Build An MVC Web Application With Node - JS, Express, and MongoDB... (Sebhastian, Nathan) (Z-Library)
Node - Js Web Development For Beginners A Step-By-Step Guide To Build An MVC Web Application With Node - JS, Express, and MongoDB... (Sebhastian, Nathan) (Z-Library)