Red Hat Linux Course: Subscribe !!!

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 40

BEGINNER TO EXPERT GUARANTEED

RED HAT LINUX


ACCESS MORE COURSES PLAYLIST LINK IN DESCRIPTION
COURSE SUBSCRIBE
!!!
TOPICS
1. INTRODUCTION TO RED HAT LINUX
2. DOWNLOADING & INSTALLING RED HAT
3. UNDERSTANDING RED HAT LINUX INTERFACE
4. BASIC COMMANDS AND OPERATIONS
5. FILE MANAGEMENT FROM COMMAND LINE
6. MANAGING RED HAT LOCAL USERS & GROUPS
7. RED HAT FILE PERMISSION SYSTEM
8. HOW TO INSTALL PACKAGES IN LINUX
9. CREATE & MANAGING LVM IN RED HAT
10. INSTALLING & MANAGING OPENSSH IN RED HAT
11. SYSLOG SERVER IN RED HAT LINUX
12. SOFT LINK & HARD LINK IN RED HAT
13. RED HAT VIRTUALIZATION SYSTEM
1. Introduction to Red hat Linux
Red Hat
Linux?
Today, Red Hat Enterprise Linux supports and powers software and technologies
for automation, cloud, containers, middleware, storage, application development,
microservices, virtualization, management, and more. Linux plays a major role as
the core of many of Red Hat's offerings.
Advantages:
•It is designed to be easy to use.
•Because of its Secure Design
•Long Last Support System and Scalability
•Lots of Service Support
•Best in Subscription
•It grows Stronger Day by Day

Disadvantages:
•Not Designed for Remote Management
•RHEL UI is not so Friendly
•Cost sometimes high for low use
•High Hardware Recommendations.
Certifications
•Red Hat Certified System Administrator (RHCSA)
•Red Hat Certified Engineer (RHCE)
•Red Hat Certified Architect (RHCA)

Job Opportunities

•Linux System Administrators


•System Administrators
•Senior Systems Administrators
•Associate Technical Support Engineer
•Lead infrastructure engineer
2. Downloading & Installing RHEL
Let’s Get Started
3. Understanding RHEL Interface
Let’s Get Started
4. Basic Commands and Operations
Let’s Get Started
5. File Management from Command Line
Let’s Get Started
6. Managing RED HAT Local Users & Groups
Users & Groups
Users and groups are used on GNU/Linux for access control—that is, to control access to
the system's files, directories, and peripherals. Linux offers relatively simple/coarse access
control mechanisms by default.
Types of Users
Let’s Verify it!
7. RED HAT File Permissions System
Files Permissions
On a Linux system, each file and directory is assigned access rights for the owner of
the file, the members of a group of related users, and everybody else. Rights can be
assigned to read a file, to write a file, and to execute a file (i.e., run the file as a program).
8. How to Install Packages in Linux
Packages ???
Let’s Try it!
9. Create & Managing LVM in RED HAT
LVM ???
LVM is a tool for logical volume management which includes allocating disks,
striping, mirroring and resizing logical volumes. With LVM, a hard drive or set of hard
drives is allocated to one or more physical volumes. LVM physical volumes can be
placed on other block devices which might span two or more disks.
Let’s Try it!
10. Installing & Managing OPENSSH in RED HAT
OPENSSH ???
OpenSSH is a freely available version of the Secure Shell (SSH) protocol family of
tools for remotely controlling, or transferring files between, computers. Traditional
tools used to accomplish these functions, such as telnet or rcp, are insecure and
transmit the user's password in cleartext when used.
Let’s Try it!
11. Syslog Server in RED HAT Linux
SYSLOG ???
The syslog server on a Linux machine can act a central monitoring point over a
network where all servers, network devices, routers, switches and most of their
internal services that generate logs, whether related to specific internal issue or just
informative messages can send their logs.
Let’s Try it!
12. Soft Link & Hard Link in Kali Linux
SOFT vs HARD LINK ???
Let’s Try it!
13. RED HAT Virtualization System
VIRTUALIZATION???
Let’s Try it!
Hope Guys You got the point of the Video

You might also like