The RHCT is the most senior system administration credential and is designed for technical leaders working in demanding enterprise environments.A Red Hat� Certified Engineer (RHCE�) who earns an RHCT certification brings an exceptional breadth and depth of knowledge to the biggest IT challenges. RHCT certification incorporates the skills and knowledge of a Red Hat Certified Datacenter Specialist (RHCDS) plus advanced networking services security, system monitoring, and performance tuning.
To become certified, an RHCT will have demonstrated knowledge and skills in a number of areas beyond RHCE, such as those related to systems deployment, systems management, clustering, and storage management. However, the RHCT certification offers the flexibility to demonstrate additional skills in either directory services and authentication or in managing virtualized systems. Consequently, an RHCT will have many, but not necessarily all, of the following skills:
Configuring users, groups, administrators, and activation keys on a Satellite
Creating base and child channels on a Satellite
Using Cobbler and Satellite to install, configure, and manage systems
Managing data using logical volumes and snapshots
Configuring high-availability clusters using physical or virtual systems
Configuring a GFS file system to meet performance, size, and quota objectives
Configuring iSCSI targets and initiators
Configuring a Kerberos realm
Configuring Red Hat Directory Server to provide a centralized directory with access control
Configuring Red Hat Enterprise Linux� clients to authenticate using various mechanisms, including Kerberos, LDAP, and Microsoft Active Directory
Configuring and managing hypervisors and virtual hosts using Red Hat Enterprise Virtualization
Analyzing system performance and behavior using tools such as vmstat, iostat, mpstat, and sar
Configuring systems to provide information using SNMP
Configuring runtime kernel parameters
Analyzing system and application behavior using ps, strace, top, Oprofile, and Valgrind
Configuring disk subsystems and scheduling algorithms and network buffers for optimal performance for specific requirements
Red Hat Enterprise Security: Network Services (RHS333):
Module 01: | Mastering basic service security |
Module 02: | Understanding cryptography |
Module 03: | Securing BIND and DNS |
Module 04: | Hardening remote procedure call (RPC) services |
Module 05: | Using Kerberos for centrally managed user authentication |
Module 06: | Improving Network File System (NFS) security with Kerberos and NFSv4 |
Module 07: | Advanced uses of Secure Shell |
Module 08: | Building a secure email infrastructure |
Module 09: | Securing FTP and Apache HTTPD services |
Module 10: | Basics of intrusion detection and response |
| |
Module 01: | Efficient team-based management of large-scale systems-before, during, and after deployment |
Module 02: | Installation and administration of Red Hat Network Satellite |
Module 03: | Building custom RPM packages |
Module 04: | Using Subversion to make changes to scripts |
Module 05: | RHN Satellite organizations, users, and roles |
Module 06: | Managing changes with revision control software |
Module 07: | Managing software with Red Hat Network, including software channels and errata |
Module 08: | Construction of custom RPM packages |
Module 07: | Reporting and automation with Red Hat Network programming API |
Module 07: | Deploying configuration files using Red Hat Network |
Module 07: | Bare-metal provisioning with PXE |
| |
Module 01: | Install and configure the Red Hat High Availability Add-On |
Module 02: | Create and manage highly available services. |
Module 03: | Work with shared storage (iSCSI) and configure multipathing. |
Module 04: | Configure GFS2 file systems. |
Module 05: | Configure XFS� file systems. |
Module 06: | Work with the Red Hat Storage Server. |
| |
Module 01: | Tuning for use-case scenarios (for example, HPC, large memory, database, and file server) |
Module 02: | Tuning for power consumption |
Module 03: | Tuning virtual machines (host and guest) |
Module 04: | Tuning memory and caches |
Module 05: | Tuning CPU and memory utilization using cgroups |
Module 06: | Gathering performance metrics and other data for tuning purposes |
| |
Module 01: | Understanding basic LDAP concepts |
Module 02: | Configuring and managing Red Hat Directory Server |
Module 03: | Managing user authentication with PAM and glibc NSS |
Module 04: | Using Kerberos and LDAP to centrally manage user authentication |
Module 05: | Using LDAP referrals and replication for distributed, highly available directory server performance |
Module 06: | Exploring options for integration with Microsoft Active Directory authentication |
| |
Module 01: | Deploy Red Hat Enterprise Virtualization platform. |
Module 02: | Configure Red Hat Enterprise Virtualization environment (datacenters, clusters, and storage domains).. |
Module 03: | Install, manage, and troubleshoot virtual machines (servers and desktops).. |
Module 04: | Create virtual machine snapshots and explore high-availability options. |
Module 05: | Use templates for rapid virtual machine deployment. |
Module 06: | Secure Red Hat Enterprise Virtualization environment with multilevel administrative roles.. |
Module 07: | Monitor and create custom reports.. |