
English | Size: 9.56 MB
Genre: eLearning
Preface A: Introduction
Section A.1: Red Hat System Administration II
Section A.2: Orientation to the Classroom Environment
Chapter 1: Improving Command-line Productivity
Section 1.1: Writing Simple Bash Scripts
Section 1.2: Guided Exercise: Writing Simple Bash Scripts
Section 1.3: Running Commands More Efficiently Using Loops
Section 1.4: Guided Exercise: Running Commands More Efficiently Using Loops
Section 1.5: Matching Text in Command Output with Regular Expressions
Section 1.6: Guided Exercise: Matching Text in Command Output with Regular Expressions
Section 1.7: Lab: Improving Command-line Productivity
Section 1.8: Summary
Chapter 2: Scheduling Future Tasks
Section 2.1: Scheduling a Deferred User Job
Section 2.2: Guided Exercise: Scheduling a Deferred User Job
Section 2.3: Scheduling Recurring User Jobs
Section 2.4: Guided Exercise: Scheduling Recurring User Jobs
Section 2.5: Scheduling Recurring System Jobs
Section 2.6: Guided Exercise: Scheduling Recurring System Jobs
Section 2.7: Managing Temporary Files
Section 2.8: Guided Exercise: Managing Temporary Files
Section 2.9: Quiz: Scheduling Future Tasks
Section 2.10: Summary
Chapter 3: Tuning System Performance
Section 3.1: Adjusting Tuning Profiles
Section 3.2: Guided Exercise: Adjusting Tuning Profiles
Section 3.3: Influencing Process Scheduling
Section 3.4: Guided Exercise: Influencing Process Scheduling
Section 3.5: Lab: Tuning System Performance
Section 3.6: Summary
Chapter 4: Controlling Access to Files with ACLs
Section 4.1: Interpreting File ACLs
Section 4.2: Quiz: Interpreting File ACLs
Section 4.3: Securing Files with ACLs
Section 4.4: Guided Exercise: Securing Files with ACLs
Section 4.5: Lab: Controlling Access to Files with ACLs
Section 4.6: Summary
Chapter 5: Managing SELinux Security
Section 5.1: Changing the SELinux Enforcement Mode
Section 5.2: Guided Exercise: Changing the SELinux Enforcement Mode
Section 5.3: Controlling SELinux File Contexts
Section 5.4: Guided Exercise: Controlling SELinux File Contexts
Section 5.5: Adjusting SELinux Policy with Booleans
Section 5.6: Guided Exercise: Adjusting SELinux Policy with Booleans
Section 5.7: Investigating and Resolving SELinux Issues
Section 5.8: Guided Exercise: Investigating and Resolving SELinux Issues
Section 5.9: Lab: Managing SELinux Security
Section 5.10: Summary
Chapter 6: Managing Basic Storage
Section 6.1: Adding Partitions, File Systems, and Persistent Mounts
Section 6.2: Guided Exercise: Adding Partitions, File Systems, and Persistent Mounts
Section 6.3: Managing Swap Space
Section 6.4: Guided Exercise: Managing Swap Space
Section 6.5: Lab: Managing Basic Storage
Section 6.6: Summary
Chapter 7: Managing Logical Volumes
Section 7.1: Creating Logical Volumes
Section 7.2: Guided Exercise: Creating Logical Volumes
Section 7.3: Extending Logical Volumes
Section 7.4: Guided Exercise: Extending Logical Volumes
Section 7.5: Lab: Managing Logical Volumes
Section 7.6: Summary
Chapter 8: Implementing Advanced Storage Features
Section 8.1: Managing Layered Storage with Stratis
Section 8.2: Guided Exercise: Managing Layered Storage with Stratis
Section 8.3: Compressing and Deduplicating Storage with VDO
Section 8.4: Guided Exercise: Compressing and Deduplicating Storage with VDO
Section 8.5: Lab: Implementing Advanced Storage Features
Section 8.6: Summary
Chapter 9: Accessing Network-Attached Storage
Section 9.1: Mounting Network-Attached Storage with NFS
Section 9.2: Guided Exercise: Managing Network-Attached Storage with NFS
Section 9.3: Automounting Network-Attached Storage
Section 9.4: Guided Exercise: Automounting Network-Attached Storage
Section 9.5: Lab: Accessing Network-Attached Storage
Section 9.6: Summary
Chapter 10: Controlling the Boot Process
Section 10.1: Selecting the Boot Target
Section 10.2: Guided Exercise: Selecting the Boot Target
Section 10.3: Resetting the Root Password
Section 10.4: Guided Exercise: Resetting the Root Password
Section 10.5: Repairing File System Issues at Boot
Section 10.6: Guided Exercise: Repairing File System Issues at Boot
Section 10.7: Lab: Controlling the Boot Process
Section 10.8: Summary
Chapter 11: Managing Network Security
Section 11.1: Managing Server Firewalls
Section 11.2: Guided Exercise: Managing Server Firewalls
Section 11.3: Controlling SELinux Port Labeling
Section 11.4: Guided Exercise: Controlling SELinux Port Labeling
Section 11.5: Lab: Managing Network Security
Section 11.6: Summary
Chapter 12: Installing Red Hat Enterprise Linux
Section 12.1: Installing Red Hat Enterprise Linux
Section 12.2: Guided Exercise: Installing Red Hat Enterprise Linux
Section 12.3: Automating Installation with Kickstart
Section 12.4: Guided Exercise: Automating Installation with Kickstart
Section 12.5: Installing and Configuring Virtual Machines
Section 12.6: Quiz: Installing and Configuring Virtual Machines
Section 12.7: Lab: Installing Red Hat Enterprise Linux
Section 12.8: Summary
Chapter 13: Comprehensive Review
Section 13.1: Comprehensive Review
Section 13.2: Lab: Fixing Boot Issues and Maintaining Servers
Section 13.3: Lab: Configuring and Managing File Systems and Storage
Section 13.4: Lab: Configuring and Managing Server Security


https://nitroflare.com/view/7B21F0DB4F991B2/Official-RH134-Red-Hat-System-Administration-II-v.8.rar

If any links die or problem unrar, send request to
https://forms.gle/e557HbjJ5vatekDV9
Leave a Reply