پیش نیازها:
- پیش نیازهای لازم در خود دوره وجود دارد. با این حال ، تجربه مدیریت سیستم عامل قبلی بسیار مفید خواهد بود.
این دوره برای چه کسی است؟
- این دوره آماده سازی که توسط آکادمی لینوکس طراحی شده است ، اشیاء عمومی را برای صدور گواهینامه Red Hat's RHCSA 7 در نظر گرفته است. در آکادمی لینوکس ، ما می خواهیم درک عمیقی از مدیریت یک سیستم Red Hat در سطح سرور به شما ارائه دهیم تا بتوانید از مهارتهای خود در سرورهای واقعی در دنیای واقعی استفاده کنید.

در ادامه با برخی از سرفصل های درسی این مجموعه آموزش آشنا می شویم :
Introduction to the RHCSA Course
Essential Tools
Access a Shell Prompt and Issue Commands
Use Input/Output Redirection
Use grep and Regular Expressions to Analyze Text
Access Remote Systems Using SSH
Log in and Switch Users in Multiuser Targets
Archive, Compress, Unpack and Uncompress Files Using tar, star, gzip and bzip
Create and Edit Text Files
Create, Delete, Copy and Move Files and Directories
Create Hard and Soft Links
List, Set and Change Standard UGO/RWX Permissions
List, Set and Change Standard UGO/RWX Permissions umask
Locate, Read and Use System Documentation with man, info and /usr/share/doc
Finding Files with Locate and Find
Understand and use essential tools
Operate Running Systems
Boot, Reboot and Shutdown a System
Boot Systems into Different Targets Manually
Interrupt the Boot Process to Gain Access to a System
Adjust Process Priority and Kill Processes - Part
Adjust Process Priority and Kill Processes - Part
Adjust Process Priority and Kill Processes - Part
Adjust Process Priority and Kill Processes - Part
Locate and Interpret System Log Files and Journals
Access a Virtual Machine's Console
Start and Stop Virtual Machines
Start, Stop and Check the Status of Network Services
Securely Transfer Files Between Systems
Operate running systems
Configure Local Storage
List, Create and Delete Partitions on MBR and GPT Disks
Using LVM
Configure Systems to Mount File Systems at Boot by UUID or Label
Add New Partitions and Logical Volumes and Swap to a System Non-Destructively
Configure Local Storage
Create and Configure File Systems
Create, Mount, Unmount and Use VFAT, EXT and XFS File Systems
Mount and Unmount CIFS and NFS Network File Systems
Extend Existing Logical Volumes
Create and Configure Set-GID Directories for Collaboration
Create and Manage Access Control Lists (ACLs)
Diagnose and Correct File Permission Problems
Create and configure file systems
Deploy, Configure and Maintain Systems
Configure Networking and Hostname Resolution Statically or Dynamically Troubles
Networking and Hostname Resolution Statically or Dynamically Network Manager
Network/Hostname Resolution Statically or Dynamically Hostname Configuration
Schedule Tasks Using at and cron
Start and Stop Services and Configure Services to Start Automatically at Boot
Configure Systems to Boot into a Specific Target Automatically
Install Red Hat Enterprise Linux Automatically Using Kickstart
Configure a Physical Machine to Host Virtual Guests
Install Red Hat Enterprise Linux Systems as Virtual Guests
Configure Systems to Launch Virtual Machines at Boot
Configure Network Services to Start Automatically at Boot
Configure a System to Use Time Services
Install and Update Software Packages from Red Hat Network, YUM REPO
Install and Update Software Packages from Red Hat Network, RPM REPO
Managing Repositories
Configuring a Local Repository
Configuring a Local Repository Configure the GPG Key
Update the Kernel Package Appropriately to Ensure a Bootable System
Modifying the System Bootloader
Deploy, configure, and maintain systems
Manage users and groups
Create, Delete, and Modify Local User Accounts
Change Passwords and Adjust Password Aging for Local User Accounts
Create, Delete, and Modify Local Groups and Group Memberships
Using set-GID On Directories
Configure a System to Use an Existing Authentication Service for User and Group
Manage Users And Groups
Manage Security
Configure Firewall Settings Using Available Firewall Utilities.
Configure Key-Based Authentication for SSH
Introduction to SELinux
Set Enforcing and Permissive Modes for SELinux
List and Identify SELinux Files and Process Contexts
Restore Default File Contexts
Use Boolean Settings to Modify System SELinux Settings
Diagnose and Address Routine SELinux Policy Violations
Preparing For The Exam
Best Practices to Remember While Taking the Exam
Finding help or documentation while in the exam