topics covered
Module 01: |
Installing and configuring a Red Hat Network Satellite server |
Module 02: |
Configuring users, groups, administrators, and activation keys on a Satellite |
Module 03:
|
Creating base and child channels on a Satellite |
Module 04:
|
Using Cobbler and Satellite to install, configure, and manage systems |
Module 05:
|
Managing data using logical volumes and snapshots
|
Module 06:
|
Configuring high-availability clusters using physical or virtual systems |
Module 07:
|
Configuring a GFS file system to meet performance, size, and quota objectives |
Module 08:
|
Configuring iSCSI targets and initiators |
Module 09:
|
Configuring a Kerberos realm |
Module 010:
|
Configuring Red Hat Directory Server to provide a centralized directory with access control |
Module 11:
|
Configuring Red Hat Enterprise Linux clients to authenticate using various mechanisms, including Kerberos, LDAP, and Microsoft Active Directory |
Module 12:
|
Configuring and managing hypervisors and virtual hosts using Red Hat Enterprise Virtualization |
Module 13:
|
Analyzing system performance and behavior using tools such as vmstat, iostat, mpstat, and sar |
Module 14:
|
Configuring systems to provide information using SNMP |
Module 15:
|
Configuring runtime kernel parameters |
Module 16:
|
Analyzing system and application behavior using ps, strace, top, Oprofile, and Valgrind |
Module 17:
|
Configuring disk subsystems and scheduling algorithms and network buffers for optimal performance for specific requirements |
In preparation to earn an RHCA, Mazenet recommends the following training courses:
Red Hat Enterprise Security: Network Services (RHS333)
|
Module 01: |
Mastering basic service security |
Module 02: |
Understanding cryptography
|
Module 03:
|
Securing BIND and DNS |
Module 04:
|
Hardening remote procedure call (RPC) services |
Module 05:
|
Using Kerberos for centrally managed user authentication
|
Module 06:
|
Improving Network File System (NFS) security with Kerberos and NFSv4 |
Module 07:
|
Building a secure email infrastructure |
Module 08:
|
Securing FTP and Apache HTTPD services |
Module 09:
|
Basics of intrusion detection and response |
Red Hat Enterprise Deployment and Systems Management (RH401)
|
Module 01: |
Efficient team-based management of large-scale systems--before, during, and after deployment |
Module 02: |
Installation and administration of Red Hat Network Satellite |
Module 03:
|
Building custom RPM packages |
Module 04:
|
Using Subversion to make changes to scripts |
Module 05:
|
RHN Satellite organizations, users, and roles
|
Module 06:
|
Managing changes with revision control software |
Module 07:
|
Managing software with Red Hat Network, including software channels and errata |
Module 08:
|
Construction of custom RPM packages |
Module 09:
|
Reporting and automation with Red Hat Network programming API |
Module 10:
|
Deploying configuration files using Red Hat Network |
Module 11:
|
Bare-metal provisioning with PXE |
or Red Hat Enterprise Virtualization (Rh418)
|
Module 01: |
Deploy Red Hat Enterprise Virtualization platform. |
Module 02: |
Configure Red Hat Enterprise Virtualization environment (datacenters, clusters, and storage domains). |
Module 03:
|
Install, manage, and troubleshoot virtual machines (servers and desktops). |
Module 04:
|
Create virtual machine snapshots and explore high-availability options.
|
Module 05:
|
Use templates for rapid virtual machine deployment.
|
Module 06:
|
Secure Red Hat Enterprise Virtualization environment with multilevel administrative roles. |
Module 07:
|
Monitor and create custom reports. |