-
Advantages and Disadvantages of Virtual Computing
After watching this video; you will be able to identify the advantages and disadvantages of virtual computing.
-
Applying Optimized Drivers
After watching this video; you will be able to apply optimized drivers to increase performance and functionality.
-
Benefits of Virtualization
After watching this video; you will be able to identify the benefits of virtualization.
-
Choosing Drivers for Hardware
After watching this video; you will be able to choose the correct drivers for your hardware in virtual environments.
-
Common Virtualization Settings
After watching this video; you will be able to describe the settings that can be changed on any virtualization manager.
-
Comparing Different Hypervisors
After watching this video; you will be able to compare the different types of hypervisors.
-
Compatibility Between Hosts and Guests
After watching this video; you will be able to describe the compatibility between hypervisors and guests and the incompatibilities when the host and guests are from different operating systems.
-
Configuring Hardware for Virtualization
After watching this video; you will be able to identify if your hardware is properly configured for virtualization.
-
Connecting Virtual Machines to External Devices
After watching this video; you will be able to describe how to connect to external devices; such as printers; removable storage; or any other device recognized by the host.
-
Controlling and Troubleshooting Access in Linux
After watching this video; you will be able to describe how to control access and troubleshoot access control in Linux.
-
Determining Hypervisor Requirements
After watching this video; you will be able to identify if your hardware is capable of running the desired hypervisor.
-
Different Types of Virtualization
After watching this video; you will be able to identify the different types of virtualization based on the type of hypervisor used.
-
Exploring Libvirt
After watching this video; you will be able to describe the linux virtualization API; service; and command line tools.
-
Exploring oVirt
After watching this video; you will be able to describe the upstream project that contributes to Red Hat's Enterprise Virtualization product.
-
Exploring Virsh
After watching this video; you will be able to configure virtual machines using the command line in Linux.
-
Features of Different Hypervisors
After watching this video; you will be able to identify the features of different hypervisors and compare them.
-
Getting Direct Access to Hardware on Physical Host
After watching this video; you will be able to describe how to get direct access to hardware on a physical host.
-
Getting Help on Linux Virtualization
After watching this video; you will be able to identify the resources that provide help for virtualization on Linux.
-
Identify the Attributes of Virtualization
After watching this video; you will be able to identify the common attributes of all virtualization platforms.
-
Installing Software in Enterprise Linux
After watching this video; you will be able to describe the essential commands for installing software in Enterprise Linux.
-
Limitations of a Guest Operating System
After watching this video; you will be able to identify the limitations of a guest operating system.
-
Linux Commands for KVM Virtualization
After watching this video; you will be able to describe the basic Linux commands to support virtualization.
-
Linux Networking versus Regular Networking
After watching this video; you will be able to describe how Linux networking is different from regular networking.
-
Managing Any Virtualization on Linux
After watching this video; you will be able to describe how to leverage Linux software to manage any virtualization.
-
Managing Services
After watching this video; you will be able to manage services.
-
Managing Virtual Network Resources
After watching this video; you will be able to describe how a hypervisor manages various network resources for virtual machines.
-
Managing Virtual Processors
After watching this video; you will be able to describe how a hypervisor manages processor resources for virtual machines.
-
Managing Virtual RAM
After watching this video; you will be able to describe how a hypervisor manages memory resources for virtual machines.
-
Managing Virtual Storage Resources
After watching this video; you will be able to describe how a hypervisor manages various storage resources for virtual machines.
-
Physical Systems versus Virtual Machines
After watching this video; you will be able to distinguish between physical systems and virtual machines.
-
Recognizing Red Hat Enterprise Management Solution
After watching this video; you will be able to recognize the Red Hat Enterprise management solution for virtualization.
-
Recognizing Virtual and Physical Environments
After watching this video; you will be able to recognize the environment you are working in.
-
Relationship Between Virtual Machine and its Server
After watching this video; you will be able to describe the relationship of a virtual machine with the server it resides on.
-
Remote File Management
After watching this video; you will be able to use Linux tools to send and receive files across networks.
-
Saving Resources through Virtualization
After watching this video; you will be able to describe how to save resources through virtualization.
-
Securing Guests through Hypervisors
After watching this video; you will be able to describe how hypervisors secure and isolate guests; and protect guests from each other.
-
Setting Up a Sandbox for Virtualization
After watching this video; you will be able to create a safe place to explore virtualization settings.
-
Storage Management
After watching this video; you will be able to configure and access local and remote storage for various puposes.
-
Understanding Activity Logs
After watching this video; you will be able to describe how system logs errors.
-
Use virt-install to Install a Guest OS
After watching this video; you will be able to install a virtual machine by using virt-install.
-
Using QEMU Emulator
After watching this video; you will be able to test images; system configuration; and available resources using QEMU emulation.
-
Using virt-install
After watching this video; you will be able to use command line tools to install virtual machines.
-
Using virt-manager
After watching this video; you will be able to use graphical tools to install and configure virtual machines.
-
Using Virtualization in Production Environments
After watching this video; you will be able to describe how virtualization is used in production environments.
-
Using virt-viewer
After watching this video; you will be able to access local and remote virtual machines using virt-viewer.
-
Verifying System for Virtualization
After watching this video; you will be able to verify whether a system is ready for virtualization.
-
Virtual Device Drivers
After watching this video; you will be able to recognize when special virtual device drivers are required.
-
Virtualization Tools in GNU/Linux
After watching this video; you will be able to describe the universal virtualization tools in GNU/Linux.
-
Virtualized and Emulated Devices
After watching this video; you will be able to describe virtual hardware entirely represented by software.
-
Working with the Guest Management Software
After watching this video; you will be able to manage virtual maching guests by using the appropriate management software.
-
Working with Virtualization
After watching this video; you will be able to work with virtualization.
-
Accessing a Virtual Machines Console
After watching this video; you will be able to access a virtual machine's console from the host.
-
Add Users; Groups; and Install Packages
After watching this video; you will be able to add and edit users; groups; and packages as well as configure user permissions on files.
-
Adding a Rule to a Policy
After watching this video; you will be able to add a new policy rule to be enforced.
-
Adding Limits to Network Traffic
After watching this video; you will be able to add a limit to the firewall for certain types of traffic.
-
Adding or Deleting an iptable Rule
After watching this video; you will be able to add and delete rules to an iptable configured firewall.
-
Adding Partitions Non-destructively
After watching this video; you will be able to add new partitions or additional swap space nondestructively.
-
Adding Shares to a Samba Server
After watching this video; you will be able to use Samba to share a directory with Windows clients.
-
Adding Users to Groups
After watching this video; you will be able to add a user to a group or groups.
-
Advanced Grep Parameters
After watching this video; you will be able to use advanced grep features like recursively finding matching files and ignoring case sensitivity .
-
Analyzing and Reviewing Logs
After watching this video; you will be able to view and analyse log files and interpret basic values from other journal sources.
-
Backing up and Restoring Volumes
After watching this video; you will be able to back up and restore volumes.
-
Blacklisting Kernel Modules
After watching this video; you will be able to use modprobe to blacklist modules.
-
Booting from MBR or GPT
After watching this video; you will be able to identify; configure; and boot from GPT or MBR.
-
Change a Process Priority and Check the Logs
After watching this video; you will be able to use renice to change a processes priority; change a network adaptors IP Address; and check the logs for any unauthorized access attempts.
-
Changing a File System Label
After watching this video; you will be able to change the label of a partition.
-
Changing Logs and Log Settings
After watching this video; you will be able to modify the system log settings and retention policies.
-
Changing the Boot Target
After watching this video; you will be able to change the boot target with systems using systemd.
-
Changing Your Password
After watching this video; you will be able to change your password through the Gnome interface or from the Shell.
-
Configuring a Basic DHCP Server
After watching this video; you will be able to configure a basic DHCP Server.
-
Configuring a Basic DNS Server
After watching this video; you will be able to configure a basic bind service.
-
Configuring a Basic FTP Server
After watching this video; you will be able to configure a basic ftp service.
-
Configuring a Basic HTTPD Server
After watching this video; you will be able to configure a basic web service.
-
Configuring a Basic Logging Server
After watching this video; you will be able to configure the logging server to store logs sent from external servers.
-
Configuring a Basic MAIL Server
After watching this video; you will be able to configure a basic mail server .
-
Configuring a Basic NTPD Server
After watching this video; you will be able to configure a basic ntpd service.
-
Configuring a Basic Samba Server
After watching this video; you will be able to configure a basic Samba server.
-
Configuring a Basic SSH Server
After watching this video; you will be able to configure a basic sshd service .
-
Configuring a Basic TELNET Server
After watching this video; you will be able to configure a basic telnet service.
-
Configuring a Guest for Running on a Host
After watching this video; you will be able to modify the running RHEL 7 guest to perform well under a host.
-
Configuring a System to use LDAP
After watching this video; you will be able to configure a system to use an LDAP based directory service.
-
Configuring a System to use MS Active Directory
After watching this video; you will be able to configure a system to use MS Active Directory.
-
Configuring a System to Use Network Time
After watching this video; you will be able to configure the system to use a network time source.
-
Configuring an SELinux Policy
After watching this video; you will be able to configure and control SELinux policies.
-
Configuring Automatic Updates in Gnome
After watching this video; you will be able to choose appropriate update times; schedules; and mode to update the RHEL 7 system.
-
Configuring Common Networking Situations
After watching this video; you will be able to configure Linux systems with common network scenarios.
-
Configuring E-mail Clients
After watching this video; you will be able to use the two default Gnome mail clients and configure basic settings to send and receive e-mail.
-
Configuring Kernel Services
After watching this video; you will be able to configure kernel setting and limits.
-
Configuring Kernel Settings
After watching this video; you will be able to alter kernel settings to solve common system issues.
-
Configuring Network Devices using Gnome
After watching this video; you will be able to use the Gnome network manager to configure a network device.
-
Configuring Network Parameters for a Host
After watching this video; you will be able to change the hostname; DNS; and other network settings for the host; including deactivating and activing a network device.
-
Configuring Networking from the Shell
After watching this video; you will be able to configure a network device entirely from the shell.
-
Configuring Permissions for an LDAP User
After watching this video; you will be able to configure and use permissions and settings for the LDAP user on the server.
-
Configuring Permissions for an MS Active Directory User
After watching this video; you will be able to configure MS AD permissions for the user on the server.
-
Configuring Red Hat Virtualization Tools
After watching this video; you will be able to distinguish between the different virtualization tools used to run guests on RHEL 7.
-
Configuring Host Settings
After watching this video; you will be able to configure settings for hosting guests.
-
Configuring SELinux Settings
After watching this video; you will be able to configure SELinux settings.
-
Configuring System Settings from Gnome
After watching this video; you will be able to configure system and security settings from the Gnome interface.
-
Configuring the Boot Loader
After watching this video; you will be able to configure the boot loader.
-
Configuring the built-in Firewall
After watching this video; you will be able to use the Security Level Configuration Tool to manage a basic firewall.
-
Configuring the Gnome Environment
After watching this video; you will be able to configure Gnome menus; panels; desktop icons; themes; and colors for a better user experience.
-
Configuring the SELinux Mode
After watching this video; you will be able to configure and choose the applicable SELinux mode.
-
Configuring the Software Repositories
After watching this video; you will be able to add; remove; or set the software repositories for yum and the Gnome package manager.
-
Controlling what is Logged
After watching this video; you will be able to configure what is logged to system logs.
-
Convert a cron Job to a SystemD Timer Unit Task
After watching this video; you will be able to convert a cron job to a systemd timer task.
-
Correcting Missing Mount Points on Boot
After watching this video; you will be able to fix mount points that no longer exist.
-
Create a LVM Filesystem and Mount It
After watching this video; you will be able to create an XFS LVM Filesystem and then mount the partition so it will be available even after rebooting.
-
Create a Script and Schedule it to Run
After watching this video; you will be able to create a script that will use grep to find files with certain contents and schedule this job to run each day at 2:05 am.
-
Creating a Basic RAID Volume
After watching this video; you will be able to create and configure a basic RAID 0; 1; and 5 volume.
-
Creating a Simple BASH Script
After watching this video; you will be able to create a simple BASH script that can chain multiple commands together to perform an action.
-
Creating Aliases and Links
After watching this video; you will be able to create aliases for commands and make links to files or directories.
-
Creating and Editing Files
After watching this video; you will be able to create and edit text files from the desktop environment using the Gnome editor.
-
Creating and Editing Files in the Shell
After watching this video; you will be able to use the Shell tools echo; cat; > to create and edit text files.
-
Creating and Editing Files with Emacs
After watching this video; you will be able to perform basic file operations and editing using the emacs text editor.
-
Creating and Managing Virtual Machines
After watching this video; you will be able to create and manage virtual machines.
-
Creating Filesystems
After watching this video; you will be able to create a filesystem on a physical disk.
-
Creating Hybrid Volumes
After watching this video; you will be able to use LVM tiered storage to use faster SSDs with HDDs to create fast "hybrid" storage.
-
Customizing the Bourne Again Shell
After watching this video; you will be able to manipulate the bash prompt and describe how the env and export features can be used.
-
Dealing with a SELinux Policy Violation
After watching this video; you will be able to identify and troubleshoot a reported policy violation.
-
Dealing with Failed Drives
After watching this video; you will be able to troubleshoot a drive that has failed in either a hot-swap or raid configuration.
-
Debugging a Filesystem Issue
After watching this video; you will be able to debug the XFS file system.
-
Describe File Permissions and Ownership
After watching this video; you will be able to describe the basic file permissions for users and groups and how they relate to file ownership.
-
Describe Users and Groups
After watching this video; you will be able to describe how users and groups work and how they are connected.
-
Describing and Comparing Shells
After watching this video; you will be able to describe a Shell; the purpose for Shells; and list some of the Shells available.
-
Describing Basic Network Terminology
After watching this video; you will be able to describe basic networking terminology and interfaces on Linux.
-
Describing How cron Schedules Jobs
After watching this video; you will be able to describe the configuration of a crontab file and the different sections for a cron job.
-
Describing iptable Rules and Configuration
After watching this video; you will be able to describe the sections of the firewall and the basics of how the firewall rules are configured.
-
Describing Parallel Network File System (pNFS)
After watching this video; you will be able to enable and support pNFS on the server.
-
Describing Regular Expressions
After watching this video; you will be able to identify and understand the basic syntax of a regular expression.
-
Describing the Boot Process
After watching this video; you will be able to describe the basic boot process and system components involved.
-
Describing the NFS
After watching this video; you will be able to describe the components of the Network File System.
-
Description of Linux Filesystems
After watching this video; you will be able to describe the various supported file systems.
-
Detecting Problems in a Guest
After watching this video; you will be able to use tools to detect problems in guests and report them to the host.
-
Executing and Controlling Scripts
After watching this video; you will be able to execute; pause; and run a script in the background and then bring it to the foreground.
-
Executing GUI Application from the Shell
After watching this video; you will be able to execute GUI applications from the command line; run them in the background; and see diagnostic or debug information in the Shell.
-
Exploring with the File Manager
After watching this video; you will be able to explore the file system using the Gnome file manager .
-
Exporting an NFS Share
After watching this video; you will be able to configure an exported share to work on reboot.
-
Fixing a Boot Partition
After watching this video; you will be able to fix boot partition issues .
-
Generating Bug Reports and Crash Notifications
After watching this video; you will be able to use built-in tools to generate bug and crash reports for diagnosis or to send to Red Hat.
-
Getting Built-in and Online Help
After watching this video; you will be able to access online help with a web browser or built-in help through Gnome.
-
Getting Help while in the Shell
After watching this video; you will be able to use man and info to get help; and identify or locate help in /usr/share/doc.
-
Growing a RAID Volume
After watching this video; you will be able to resize a RAID volume.
-
Identifying File Permission Security Issues
After watching this video; you will be able to troubleshoot common file permission security issues.
-
Identifying Linux Filesystems
After watching this video; you will be able to identify the file systems of mounted and external drives.
-
Identifying Network Devices
After watching this video; you will be able to identify network devices and their configuration.
-
Identifying Red Hat Enterprise 7 Hardware Requirements
After watching this video; you will be able to describe Red Hat Enterprise Linux (RHEL) 7 hardware requirements.
-
Identifying Red Hat Virtualization Tools
After watching this video; you will be able to describe the built-in virtualization tools and programs in RHEL 7.
-
Identifying Remote Access Technologies
After watching this video; you will be able to describe the various remote access technologies that are available on Linux.
-
Identifying SystemD Startup Services
After watching this video; you will be able to use SystemD to start services.
-
Identifying the Components to SELinux
After watching this video; you will be able to identify and recognize the components and purpose of SELinux.
-
Install and Boot
After watching this video; you will be able to install RHEL 7 on a physical computer and identify the different stages of the boot process.
-
Install as a VM Guest
After watching this video; you will be able to use RHEL 7 as a host for VMs and as a client running on a VM.
-
Installing and Starting NFS
After watching this video; you will be able to install; setup; and configure NFS.
-
Installing on Systems using UEFI
After watching this video; you will be able to recognize issues that can occur with UEFI and some settings that may help get RHEL 7 to install.
-
Installing as a Guest
After watching this video; you will be able to install RHEL 7 as a guest.
-
Installing with a Kickstart Script
After watching this video; you will be able to use a kickstart script to do an installation.
-
Installing Software Using the Gnome Package Manager
After watching this video; you will be able to install software from the package manager.
-
Interrupting the Boot Process to Gain Access
After watching this video; you will be able to alter the boot process to gain access to fix problems or diagnose issues.
-
Launching Guests at Boot on the Host
After watching this video; you will be able to configure the system to start virtual machines on boot.
-
Launching as a Guest
After watching this video; you will be able to launch a RHEL 7 guest from the host.
-
Listing and Identifying Processes
After watching this video; you will be able to list and identify running processes.
-
Locating Content within a Text File
After watching this video; you will be able to use grep to locate content within a text file.
-
Logging in with an Active Directory User Account
After watching this video; you will be able to log in to the server using a MS Active Directory user account.
-
Logging in with an LDAP User Account
After watching this video; you will be able to login to the server using a user account from the LDAP directory service.
-
Making a Volume Snapshot
After watching this video; you will be able to create a snapshot of a volume.
-
Manage an NFS Mount on a Remote Server
After watching this video; you will be able to Use a Directory Service configured client to mount a remote NFS share that you configure on a remote host.
-
Manage and Archive Files within Scripts
After watching this video; you will be able to use scripts to automate the management and archiving of files and directories.
-
Managing and Configuring Swap Space
After watching this video; you will be able to describe swap space requirements and how to manage swap space during installation.
-
Managing cron Jobs
After watching this video; you will be able to edit and pause cron jobs as well as set jobs for users and root.
-
Managing Groups
After watching this video; you will be able to add; modify; and delete groups.
-
Managing Permissions on Directories
After watching this video; you will be able to change a directory's owner; group; and permissions.
-
Managing Permissions on Files
After watching this video; you will be able to change a file's owner and group and set file and group permissions.
-
Managing Process Priorities
After watching this video; you will be able to set or change the priority for a process.
-
Managing SystemD in the Boot Process
After watching this video; you will be able to create boot targets; boot states; and control parallel daemon instantiation with SystemD.
-
Managing Users from the Shell
After watching this video; you will be able to add; delete; and edit a user from a Shell including how to set the user properties; Shell; and home directory.
-
Managing Users within Gnome
After watching this video; you will be able to add; edit; modify; and delete a user using the Gnome User Manager application.
-
Managing Volumes from the Shell
After watching this video; you will be able to use Shell commands to manage LVM storage.
-
Manipulating an at Job
After watching this video; you will be able to alter; delete; and view at jobs.
-
Manipulating an LVM Volume
After watching this video; you will be able to use basic LVM commands to create and remove volumes.
-
Manipulating Directories
After watching this video; you will be able to list; create; move; change; and delete directories and use shortcuts to move around the file system.
-
Manipulating Files
After watching this video; you will be able to list; copy; move; and delete files.
-
Manipulating Files and Directories
After watching this video; you will be able to copy; move; delete; and rename files and directories using the Gnome file manager.
-
Modifying a User's Default Group
After watching this video; you will be able to modify a user's default group.
-
Monitoring Processes
After watching this video; you will be able to monitor processes and their resource utilization.
-
Mounting a Filesystem at Boot
After watching this video; you will be able to configure the system to mount a filesystem at boot.
-
Mounting an Encrypted Filesystem at Boot
After watching this video; you will be able to mount an encrypted filesystem at boot and use a fully encrypted filesystem.
-
Mounting an External NFS Share
After watching this video; you will be able to mount an external shared NFS partition to the local system.
-
Mounting and Unmounting a Filesystem
After watching this video; you will be able to mount and unmount various file systems.
-
Mounting and Unmounting of Filesystems or Devices
After watching this video; you will be able to control the automatic mounting of filesystems when devices are plugged in and safely unmount filesystems.
-
Mounting and Using iSCSI Devices
After watching this video; you will be able to mount and unmount iSCSI Network Area Storage.
-
Mounting and Using SMB Shares
After watching this video; you will be able to mount and unmount remote SMB; or Samba; shares.
-
Navigating in the Shell
After watching this video; you will be able to using autocomplete; and using history with the hist command and arrow keys.
-
Navigating the Gnome Desktop Environment
After watching this video; you will be able to use Gnome to run applications; manage virtual workspaces; and use window control buttons.
-
Obtaining Information about a Guest
After watching this video; you will be able to obtain information about a guest.
-
Opening a Port through the Firewall
After watching this video; you will be able to add a rule to allow a network service port through the firewall.
-
Patching the Kernel
After watching this video; you will be able to use kpatch to do dynamic patches to the kernel.
-
Performing Actions on Files that are Found
After watching this video; you will be able to perform actions on files that are returned from a find command.
-
Performing Login; Logoff; and Power Operations
After watching this video; you will be able to log in; log off; lock; and unlock a Gnome session as well as power up and down a system .
-
Performing Searches for Files
After watching this video; you will be able to use the find command to locate files based on their name or other properties.
-
Recognize an LVM Configuration
After watching this video; you will be able to identify and describe LVM configuration for volumes.
-
Recognizing and Identifying SELinux Policies
After watching this video; you will be able to identify and choose SELinux policies.
-
Recognizing Archived and Compressed Files
After watching this video; you will be able to recognize an archived file and the tools necessary to retrieve the contents.
-
Recognizing BASH Scripts
After watching this video; you will be able to identify a BASH script file and the header specifying the interpreter used for the script.
-
Recognizing Common Processes
After watching this video; you will be able to recognize common running processes.
-
Recognizing POSIX File Security
After watching this video; you will be able to identify POSIX file and ownership permissions on files and directories.
-
Recognizing the Relationship between Xwindows and Gnome
After watching this video; you will be able to describe the roles and differences between Xwindows and the Gnome desktop environment.
-
Reinstalling or Replacing a Software Package Using yum
After watching this video; you will be able to remove; reinstall; or replace a software package.
-
Resetting a User's Password
After watching this video; you will be able to change any user's password including the root user.
-
Resizing a Filesystem
After watching this video; you will be able to resize an MBR-based partition.
-
Restoring SELinux Contexts
After watching this video; you will be able to use restorecon to restore file security contexts.
-
Reviewing SystemD System Logs
After watching this video; you will be able to review SystemD journal logs.
-
Running Network Services
After watching this video; you will be able to work with network services through SystemD Services.
-
Saving and Restoring iptable Rulesets
After watching this video; you will be able to save and restore iptable rulesets.
-
Scheduling a cron Job
After watching this video; you will be able to create a cron job.
-
Scheduling a SystemD Timer Unit Task
After watching this video; you will be able to schedule a SystemD Timer task.
-
Scheduling an at job
After watching this video; you will be able to schedule a job using at.
-
Selecting an Installation Method
After watching this video; you will be able to describe and be able to select the appropriate installation method.
-
Setting and Configuring NFS Exports
After watching this video; you will be able to add and configure a local NFS share.
-
Setting the RunLevel
After watching this video; you will be able to alter the RunLevel of the system.
-
Setting up a SQUID Server
After watching this video; you will be able to configure a basic squid proxy service.
-
Setting Up Shared Directories for Users
After watching this video; you will be able to create a directory that can be shared by multiple users in a common group.
-
Setting User Properties in /etc/passwd
After watching this video; you will be able to modify user properties directly in the /etc/passwd file to fix user problems.
-
Start a Network Service and Allow Access
After watching this video; you will be able to start a network service add a rule to the firewall to allow external access to the service.
-
Starting and Stopping a Guest
After watching this video; you will be able to start; stop; and control guests.
-
Starting and Stopping a Service
After watching this video; you will be able to start and stop a network service.
-
Starting and Stopping Processes
After watching this video; you will be able to start and stop processes.
-
Starting Services at Boot
After watching this video; you will be able to configure a service to start or not start at boot.
-
Storing and Archiving Logs
After watching this video; you will be able to store and archive logs.
-
Supporting International Keyboards
After watching this video; you will be able to configure keyboard support.
-
Switching and Using TTY Consoles
After watching this video; you will be able to switch to; and back from; TTY consoles in order to execute Shell commands.
-
Switching Shells and Users
After watching this video; you will be able to switch users and Shells within a terminal window; in particular to become the root user to perform administrative tasks.
-
Switching Users and/or Desktops
After watching this video; you will be able to switch users on a multiuser system and run multiple desktops for different users.
-
Throttling Guest I/O and Managing Performance
After watching this video; you will be able to throttle I/O for a guest and manage guest resource allocations.
-
Transferring Files to a Host Securely
After watching this video; you will be able to use SCP to transfer a file to and from a host.
-
Troubleshoot and Secure a Linux System
After watching this video; you will be able to use SELinux to protect a network service and find the processes using the most memory or CPU resources.
-
Troubleshooting a Process
After watching this video; you will be able to troubleshoot or identify problem processes.
-
Troubleshooting and Repairing File Systems Part2
After watching this video; you will be able to describe the basic tools for repairing a variety of file systems.
-
Troubleshooting Boot Failures
After watching this video; you will be able to troubleshoot basic boot failures after an installation.
-
Troubleshooting CPU/Memory Intensive Processes
After watching this video; you will be able to troubleshoot CPU or memory intensive processes.
-
Troubleshooting File Permission Issues
After watching this video; you will be able to identify and diagnose file permission issues.
-
Troubleshooting GRUB
After watching this video; you will be able to troubleshoot and configure the GRUB boot loader.
-
Troubleshooting Locked Files
After watching this video; you will be able to identify locked files or files used by a process.
-
Troubleshooting Memory Issues
After watching this video; you will be able to troubleshoot common memory issues.
-
Troubleshooting Network Issues
After watching this video; you will be able to troubleshoot common network issues.
-
Tunneling insecure connections over SSH
After watching this video; you will be able to work with ssh tunneling to secure vnc or xdmcp.
-
Updating the Kernel
After watching this video; you will be able to update or modify a kernel to ensure a bootable system.
-
Updating the System Using Gnome
After watching this video; you will be able to update the current software manually or automatically using the package manager.
-
Updating the System Using yum
After watching this video; you will be able to update the system software from the Shell.
-
Use Gnome and the BASH Shell
After watching this video; you will be able to explore the Gnome User Interface and run commands from the BASH Shell.
-
Using a Firewall Manager
After watching this video; you will be able to use the advanced features of the firewall manager.
-
Using a Firewall Ruleset at Boot
After watching this video; you will be able to configure the system to use a set of firewall rules on boot from the shell.
-
Using ACLs; DACs; and MACs
After watching this video; you will be able to get and set discretionary and mandatory Access Control Lists.
-
Using AD Enrollment with Kickstart
After watching this video; you will be able to configure kickstart to automatically connect to a directory service.
-
Using Advanced Vim Editor Commands
After watching this video; you will be able to use features of vim to search text; replace text; and add; remove; or delete lines.
-
Using an Encrypted Filesystem
After watching this video; you will be able to use an encrypted filesystem.
-
Using and Compressing Swap Partitions
After watching this video; you will be able to using and compressing swap partitions or files.
-
Using autofs with SMB Shares
After watching this video; you will be able to use autofs to mount shares automatically.
-
Using bzip2 to Compress and Decompress Files
After watching this video; you will be able to use bzip2 to compress or decompress a file.
-
Using Compression with the Tape Archiver
After watching this video; you will be able to use gzip and bzip2 with tar directory to compress and decompress in a stream.
-
Using dracut for Installation
After watching this video; you will be able to investigate booting or installation issues using dracut.
-
Using Expansion in Scripts
After watching this video; you will be able to describe the order of expansion when used in a script.
-
Using Filename Globbing
After watching this video; you will be able to use globbing to select files based on matching filename patterns.
-
Using GPT Disks
After watching this video; you will be able to use tools to create; delete; and list GPT-based partitions.
-
Using Grep
After watching this video; you will be able to use grep to find patterns in a file based on simple patterns or regular expressions.
-
Using Grep with Redirection
After watching this video; you will be able to use grep with I/O redirection and pipes to create lists.
-
Using gzip and gunzip to Compress and Decompress Files
After watching this video; you will be able to use the gzip and gunzip commands to compress or decompress a file.
-
Using Input and Output Redirection
After watching this video; you will be able to use input and output redirection to stdin and stdout to manage output from Shell commands.
-
Using Kernel Modules
After watching this video; you will be able to list; add; remove; and configure kernel modules.
-
Using Keys with SSH to Automate Connections
After watching this video; you will be able to use ssh keys to authenticate rather than user name and password.
-
Using Kickstart to Automate Installations
After watching this video; you will be able to use kickstart to create an automation script for automated installs.
-
Using Kickstart to Install a Guest VM
After watching this video; you will be able to use a kickstart script to install RHEL 7 as a guest.
-
Using Local Repositories for Package Management
After watching this video; you will be able to configure a local repository and only allow software packages and updates that have been approved.
-
Using Logic Statements Part 1
After watching this video; you will be able to use the if statement and the for basic looping construct.
-
Using Logic Statements Part 2
After watching this video; you will be able to use the while and until looping constructs.
-
Using MBR Disks
After watching this video; you will be able to use tools to create; delete; list; and manage MBR-based partitions.
-
Using Network tools
After watching this video; you will be able to work with the network manager to check the network configuration and explore networks from the File Manager.
-
Using NFSv4 Securely
After watching this video; you will be able to recognize the differences in the configuration for running NFS securely.
-
Using Other Compression and Decompression Tools
After watching this video; you will be able to use additional; but not as often used in Linux; compression and decompression tools.
-
Using Password Policies
After watching this video; you will be able to apply user password ageing and other policies to user accounts.
-
Using Pipes
After watching this video; you will be able to use pipes to chain one command to another to alter the output .
-
Using PTP for Network Time
After watching this video; you will be able to configure a system to use Precision Time Protocol.
-
Using Quotas
After watching this video; you will be able to add; edit; and view quotas.
-
Using read in a Script
After watching this video; you will be able to use read to get input from the user in a BASH script.
-
Using Relative and Absolute Paths
After watching this video; you will be able to describe how relative and absolute paths are used and how shortcuts like ../ and ~/ make directory traversal easier.
-
Using as a Guest
After watching this video; you will be able to describe and use RHEL 7 as a guest running on a host.
-
Using as a Host
After watching this video; you will be able to configure and optimize RHEL 7 to be a host for guests.
-
Using SELinux Process Contexts
After watching this video; you will be able to use and apply an SELinux process context.
-
Using SELinux Roles
After watching this video; you will be able to identify role-based access controls (RBAC) in SELinux.
-
Using SELinux to Secure a Network Service
After watching this video; you will be able to use SELinux to secure a network service.
-
Using SELinux User Contexts
After watching this video; you will be able to identify and recognize the components and purpose of SELinux user contexts.
-
Using Shell Text Editors to Create and Edit Files
After watching this video; you will be able to use a Shell text editor to create or edit a text file.
-
Using Shell Variables and the Shell Environment
After watching this video; you will be able to view the Shell environment variables and be able to set a Shell variable within a script.
-
Using SSH to Connect to a Host
After watching this video; you will be able to use SSH to connect to a remote host.
-
Using sVirt to Protect Guests
After watching this video; you will be able to use sVirt to protect guests.
-
Using SystemD JournalD with Syslog
After watching this video; you will be able to configure systemd journals to forward system messages to traditional system logging tools.
-
Using SystemD Process Management
After watching this video; you will be able to use SystemD to manage the system.
-
Using SystemD Timer Units
After watching this video; you will be able to describe a systemd timer unit and the options.
-
Using SystemD to Manage Services
After watching this video; you will be able to work with SystemD to manage running services.
-
Using SystemTap for Diagnostics
After watching this video; you will be able to use SystemTap to investigate and monitor the activities of the operating system kernel.
-
Using Telnet to Connect to a Host
After watching this video; you will be able to use Telnet to connect to remote hosts.
-
Using Test Operators
After watching this video; you will be able to use bash test operators to check for conditions.
-
Using the Bourne Again Shell
After watching this video; you will be able to open; close; set fonts; set colors; resize; and run a command from the Bourne Again Shell (BASH).
-
Using the Exit Status
After watching this video; you will be able to set an exit status and use it from the shell.
-
Using the Extended Tape Archiver (star) Command
After watching this video; you will be able to use the star command to create; extract; compress; or list the contents of an archive that supports extended ACLs.
-
Using the Gnome Package Manager
After watching this video; you will be able to run the Gnome package manager to view installed sofrware or find software.
-
Using the Red Hat Rescue Environment
After watching this video; you will be able to troubleshoot using the Red Hat Rescue Environment.
-
Using the Stream Editor to Edit Files
After watching this video; you will be able to work with sed to alter the contents of a text file.
-
Using the Tape Archiver (tar) Command
After watching this video; you will be able to use the tar command to create; extract; compress; or list the contents of an archive.
-
Using Thin Provisioning
After watching this video; you will be able to manage free space in a storage pool and allocate space as required.
-
Using Vim to Create and Edit Files
After watching this video; you will be able to work with vim to open; do basic edits; and save a text file.
-
Using VNC to Connect to a Host or to Host a Connection
After watching this video; you will be able to use VNC to connect; or be the host of; a remote connection.
-
Using Volume Groups
After watching this video; you will be able to assign logical and physical volumes to a volume group.
-
Using Which and Locate
After watching this video; you will be able to identify the path and filename for a command or locate files that have been indexed.
-
Using yum
After watching this video; you will be able to use yum to list; find; and install software packages from the Shell.
-
Viewing and Comparing File Contents from a Shell
After watching this video; you will be able to use common commands like less; cat; more; and diff to view and compare file contents.
-
Working with /etc/passwd and /etc/shadow
After watching this video; you will be able to describe the components of the /etc/passwd file and the purpose of the /etc/shadow file.
-
Working with at to Schedule Jobs
After watching this video; you will be able to identify the at parameters and commands used for managing jobs.
-
Working with Directory Services
After watching this video; you will be able to identify the files and setting that must be changed to support an external directory service.
-
Working with Scheduled Jobs
After watching this video; you will be able to describe the different job schedulers and how they differ.
-
Part I
After watching this video; you will be able to perform the initial install of RHEL 7 onto a physical system using the graphical installer.
-
Part II
After watching this video; you will be able to complete the install of RHEL 7 onto a physical system using the graphical installer.
-
Part 1
After watching this video; you will be able to troubleshoot and repair the XFS file system.
-
Part I
After watching this video; you will be able to perform a minimal install using the text mode installer.
-
Part II
After watching this video; you will be able to complete a minimal install using the text mode installer.
-
Configuring Common Networking Situations
After watching this video; you will be able to list the location of log files and the purpose of the common logs.