RHCSA / RHCE Exam Preparation

A preparatory class based upon the demands of Red Hat Certification Exams.

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License . Essentially, you can use, reuse, share, and rebuild but acknowledgement and credit are required. No commercial use permitted. Follow the link for legalities and details.

Please note that this document version is #1418226783 and was generated on Dec 10, 2014 at 09:53:03. Check back for updates.


Table of Contents

Introduction
Some Background Info
Audience
Contributions
Reasonable Expectations
1. Class #1 - Introduction & the Linux Boot Process
Course Introduction
Course Goals
Preparation Recommendations
Choosing a Platform for Practice and Study
How this Material is Organized
Class Schedule
The Linux Boot Process
Boot, Reboot, Shutdown
Runlevels
BIOS
The GRUB Bootloader
New in RHEL 7: GRUB 2
The init Process
The inittab File
Reference Material for this Chapter
2. Class #2 - Linux Filesystem Management
The Key Filesystem Concept
Linux Filesystem Hierarchy Standard
Working with Filesystem Partitions
Creating & Formatting Partitions
Mounting & Managing Filesystems
Working With Swap
LUKS Encryption
LVM (Logical Volume Management)
File System Permissions
Viewing & Changing Permissions
Critical File Permission Commands
Umask
Access Control Lists
Reference Material for this Chapter
3. Class #3 - Software & User Management
Introduction to Red Hat Software Management
The RPM Architecture
Querying for Package Information
RPM Package Naming
Uninstalling Packages
RPM over a Network
Upgrading a Kernel
Software Verification
The Red Hat Network (RHN)
Third Party Repositories
Managing & Creating a Software Repository
YUM Update Manager
Intro to User Administration
User Configuration Files
Commands for User Administration
Access Control Lists
Reference Material for this Chapter
4. Class #4 - Networking, Routing & SSH
Networking & Routing Introduction
Installing Networking
Networking Configuration
Networking as a Service
Commands to Manipulate Networking
Securing Networking
Additional Notes & Considerations for Networking
Intro to SSH
Installing SSH
SSH Configuration
SSH as a Service
Commands to Manipulate SSH
Securing SSH
Additional Notes & Considerations for SSH
Reference Material for this Chapter
5. Class #5 - Securing Linux: IP Tables, SELinux & TCP Wrappers
Intro to IP Tables
Installing IP Tables
IP Tables Configuration
IP Tables as a Service
Commands to Manipulate IP Tables
New in RHEL 7 - firewalld
Intro to SELinux
Installing SELinux
SELinux Configuration
SELinux as a Service
Commands to Manipulate SELinux
Understanding SELinux
Intro to TCP Wrappers
Installing TCP Wrappers
TCP Wrappers Configuration Files
TCP Wrappers Protects Select Services
Additional Notes & Considerations for TCP Wrappers
Utilities that Make Use of the Above
Reference Material for this Chapter
6. Class #6 - Virtualization via KVM & the Bash Shell
Intro to KVM
Installing KVM
KVM Configuration
KVM as a Service
Commands to Manipulate KVM
Securing KVM
Additional Notes & Considerations for KVM
Intro to Bash
Installing Bash
Bash Configuration
Commands to Manipulate Bash
Additional Notes & Considerations for Bash
Reference Material for this Chapter
7. Class #7 - System Administration & System Logging Configuration
Intro to System Administration
System Administration Configuration
System Administration Commands
Additional Notes & Considerations for System Administration
New in RHEL 7: systemd
Intro to rsyslog
Installing rsyslog
rsyslog Configuration
rsyslog as a Service
Commands to Manipulate rsyslog
Securing rsyslog
Additional Notes & Considerations for rsyslog
Reference Material for this Chapter
8. Class #8 - NTP, Remote Access, & System Reporting
Intro to NTP
Installing NTP
NTP Configuration
NTP as a Service
Commands to Manipulate NTP
Securing NTP
Additional Notes & Considerations for NTP
Intro to Remote Access with VNC
Installing VNC
VNC Configuration
VNC as a Service
Commands to Manipulate VNC
Securing VNC
Additional Notes & Considerations for VNC
Intro to System Reporting
Installing System Reporting
System Reporting Commands & Services
Additional Notes & Considerations for System Reporting
Reference Material for this Chapter
9. Class #9 - HTTP & FTP
Intro to FTP
Installing FTP
FTP Configuration
FTP as a Service
Securing FTP
Additional Notes & Considerations for FTP
Intro to HTTP
Installing HTTP
HTTP Configuration
HTTP as a Service
Commands to Manipulate HTTP
Securing HTTP
Additional Notes & Considerations for HTTP
Reference Material for this Chapter
10. Class #10 - NFS & Samba
Intro to NFS
Installing NFS
NFS Configuration
NFS as a Service
Commands to Manipulate NFS
Securing NFS
Additional Notes & Considerations for NFS
Intro to Samba
Installing Samba
Samba Configuration
Samba as a Service
Commands to Manipulate Samba
Securing Samba
Additional Notes & Considerations for Samba
Reference Material for this Chapter
11. Class #11 - DNS & SMTP
Intro to DNS
Installing DNS
DNS Configuration
DNS as a Service
Commands to Manipulate DNS
Securing DNS
Additional Notes & Considerations for DNS
Intro to SMTP & postfix
Installing postfix
postfix Configuration
postfix as a Service
Commands to Manipulate postfix
Securing postfix
Additional Notes & Considerations for postfix
Reference Material for this Chapter
12. Class #12 - iSCSI, Miscellaneous Topics, and Conclusion
Intro to iSCSI
Installing iSCSI
iSCSI Configuration
iSCSI as a Service
Commands to Manipulate iSCSI
Securing iSCSI
Additional Notes & Considerations for iSCSI
Questions, Comments, Complaints
13. Exercises
Concept Mastery
Initial Setup Exercise
Recovering the 'root' Password
View Logs
Manipulating Services
Manipulating the System Bootloader
Creating & Managing User Accounts
Creating Basic Partitions
Using Logical Volume Management (LVM)
User Collaborative Directory
Create a LUKS Encrypted Partition
Creating Swap Space Method #1
Creating Swap Space Method #2
Configure File System ACLs (Access Control Lists)
Manually Create a Software Repo
Manually Build an RPM
Manually Create a Bridge Networking Device
Establish Key-Based SSH Login
Create a Secure "Drop-box" for Anonymous FTP Upload
Apache User Home Directories
Apache User Authentication
Apache User Configuration with .htaccess
Apache User Based Security with LDAP Authentication
Apache Group Share
Configuring for Name Virtual Host Configuration
Configuring for CGI-BIN Scripts
Create & Install a Self-Signed SSL Certificate
Enable Home Directory Shares with Samba
Create a Public Share with Samba
NFS Server Setup
NFS Client Setup
NFS & AutoMount Setup
Create a Caching DNS Server
Create a Forwarding DNS Server
Configure postfix Email Server
iSCSI Initiator Setup
14. Additional Resources, Practice Tests, etc.
15. FAQ

List of Figures

1.1. Boot 0
1.2. Boot 1
1.3. Boot 2
1.4. Boot 3
1.5. Boot 4
1.6. Boot 5
1.7. Boot 6
1.8. Boot 7
1.9. Boot 8
1.10. Run Level
2.1. FHS 1
2.2. Directory Listing Showing Permissions
2.3. "Hidden" Files & Soft Links
2.4. SUID Bit Shown in Listing
2.5. Block & Character Devices and the "Sticky Bit"
2.6. SUID Bit on the `ping` Command
2.7. Directories with the "Sticky Bit"
2.8. Permissions in a Nutshell
3.1. RPM Query
3.2. Red Hat User Manager GUI
4.1. Format of the '/etc/hosts' File
5.1. SELinux Executable File Contexts
5.2. SELinux Home Directory File Contexts
5.3. SELinux HTTPD File Contexts
5.4. SELinux /etc Directory File Contexts
6.1. Bash Script Header
7.1. Crontab Config File
7.2. Service Usage Options
9.1. Apache Virtual Host Configuration
11.1. Email Cycle and Terminology

List of Tables

1.1. Class Schedule
1.2. Runlevel Definitions
3.1. RPM Architecture
3.2. Common RPM Queries
3.3. RPM Architecture Naming Convention
3.4. Package Installation & Upgrading
3.5. Change Codes from rpm --verify
3.6. Yum Repository Mandatory Configuration Items
3.7. Yum Repository Common Optional Configuration Items
3.8. Common `yum` Commands
3.9. User Administration Environment Files
3.10. User Administration Config Files
3.11. User Administration CLI Tools
3.12. Access Control List Commands
4.1. Crucial Networking Configuration Elements
4.2. SSH Server Configuration Directives
5.1. IP Tables Important Terms
5.2. IP Tables Built In Chains
5.3. IP Tables Targets
5.4. IP Tables Connection Tracking States
5.5. Ip Tables Command Options
5.6. SELinux Packages
5.7. SELinux Enforcement Modes
5.8. SELinux Config Files
5.9. SELinux Commands
5.10. SELinux Policy Types
6.1. Common Virtualization Terms
6.2. Valuable VM Management Commands
7.1. Common System Administration Commands
7.2. rsyslog Critical Terminology
8.1. NTP Configuration Terms Defined
8.2. ntp.conf Configuration Directives
8.3. Critical VNC Commands
9.1. Apache Web Server Critical File Locations
9.2. Apache Virtual Host Types
9.3. Several httpd SELinux File Contexts
10.1. NFS Versions
10.2. NFS Configuration Files
10.3. NFS Commands
10.4. Samba Global Configuration
10.5. Samba Server Security Models
11.1. Types of DNS Servers
11.2. Crucial DNS (bind) Packages
11.3. Useful DNS Commands
11.4. DNS Record Types
11.5. Email Terms and Concepts
12.1. iSCSI Terms