ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب RHCSA Red Hat Enterprise Linux 8 (UPDATED): Training and Exam Preparation Guide (EX200), Second Edition

دانلود کتاب RHCSA Red Hat Enterprise Linux 8 (به روز شده): راهنمای آموزشی و آمادگی آزمون (EX200)، ویرایش دوم

RHCSA Red Hat Enterprise Linux 8 (UPDATED): Training and Exam Preparation Guide (EX200), Second Edition

مشخصات کتاب

RHCSA Red Hat Enterprise Linux 8 (UPDATED): Training and Exam Preparation Guide (EX200), Second Edition

ویرایش:  
نویسندگان:   
سری:  
ISBN (شابک) : 1775062147, 9781775062141 
ناشر: Endeavor Technologies Inc. 
سال نشر: 2020 
تعداد صفحات: 772 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 80 مگابایت 

قیمت کتاب (تومان) : 42,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 16


در صورت تبدیل فایل کتاب RHCSA Red Hat Enterprise Linux 8 (UPDATED): Training and Exam Preparation Guide (EX200), Second Edition به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب RHCSA Red Hat Enterprise Linux 8 (به روز شده): راهنمای آموزشی و آمادگی آزمون (EX200)، ویرایش دوم نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب RHCSA Red Hat Enterprise Linux 8 (به روز شده): راهنمای آموزشی و آمادگی آزمون (EX200)، ویرایش دوم



HIGHLIGHTS

> پوشش‌های Red Hat Enterprise Linux 8

> پوشش‌های همه جدیدترین اهداف آزمون رسمی

(از جمله اسکریپت پوسته و کانتینرها)

> عالی برای خودآموزی و آموزش در کلاس/مجازی

> 23فصل

> 108 تمرینات گام به گام زندگی واقعی و اسکریپت های پوسته

> 80 آزمایشگاه چالشی خودت انجام بده

> 408 بازبینی پرسش و پاسخ

> 4 نمونه RHCSA امتحانات (23 وظیفه در هر آزمون)


RHCSA Red Hat Enterprise Linux 8 (به روز شده): راهنمای آموزشی و آمادگی برای امتحان، نسخه دوم پوشش عمیقی از آخرین اهداف آزمون RHCSA EX200 را ارائه می دهد که شامل اسکریپت پوسته و کانتینرها می شود. قطعی ترین راهنمای موجود در مورد این موضوع، این کتاب مفاهیم را توضیح می دهد، فایل های پیکربندی را تجزیه و تحلیل می کند، خروجی های فرمان را توصیف می کند، مراحل گام به گام را نشان می دهد (شامل تصاویری از دستورات واقعی اجرا شده و خروجی های آنها) و درک خوانندگان از مفاهیم و رویه‌ها با ارائه آزمایشگاه‌های اضافی فراوان و نمونه کارهای امتحانی واقع‌گرایانه که به تنهایی انجام می‌شوند.


این کتاب دارای ۲۳ فصل< /strong> که به طور منطقی سازماندهی شده اند، از راه اندازی آزمایشگاه گرفته تا اصول لینوکس تا موضوعات پیچیده مدیریت لینوکس. این کتاب موضوعات مربوط به نصب محلی RHEL 8 را پوشش می دهد. تعامل اولیه با سیستم؛ دستورات اساسی لینوکس؛ فشرده سازی و بایگانی؛ ویرایش و دستکاری فایل؛ مجوزهای استاندارد و ویژه؛ جستجوی فایل و کنترل های دسترسی؛ فایل های نظارت و احراز هویت کاربر؛ کاربران، گروه ها و پیری رمز عبور؛ ویژگی های پوسته bash و فایل های راه اندازی. فرآیندها و زمان بندی وظایف؛ تکنیک های مدیریت نرم افزار پایه و پیشرفته؛ فرآیند بوت سیستم و بوت لودر؛ مدیریت هسته و مقداردهی اولیه سیستم؛ ورود به سیستم و تنظیم سیستم؛ ابزارها و راه حل های مدیریت ذخیره سازی اولیه و پیشرفته؛ سیستم های فایل محلی و مناطق مبادله. دستگاه شبکه و پیکربندی اتصال؛ سیستم های فایل از راه دور و نصب خودکار؛ هماهنگ سازی زمان و وضوح نام میزبان. سرویس پوسته ایمن؛ فایروال و کنترل های SELinux؛ و پوسته اسکریپت و کانتینرها.


هر فصل موضوعات اصلی و اهداف امتحان مربوطه را در ابتدا برجسته می‌کند و با چندین سؤال و پاسخ مروری و خودتان انجام دهید پایان می‌یابد. آزمایشگاه های چالش در سراسر کتاب، شکل‌ها، جداول، عکس‌های صفحه نمایش، مثال‌ها، یادداشت‌ها و نکات امتحانی برای پشتیبانی از توضیحات و آمادگی امتحان ارائه شده است. این کتاب شامل چهار نمونه آزمون RHCSA است که انتظار می رود با استفاده از دانش و مهارت های به دست آمده از خواندن مطالب، دنبال کردن تمرین ها و تکمیل آزمایشگاه های چالشی انجام شود. آزمایشگاه‌ها و نمونه‌های امتحانی شامل نکاتی درباره موضوعات و/یا تمرین‌های مرتبط هستند.


این کتاب ممکن است به‌عنوان یک راهنمای خودآموز توسط داوطلبان آزمون RHCSA 8 استفاده شود. منبعی توسط مربیان و دانش آموزان برای پیگیری در جلسات آموزشی فیزیکی و مجازی، منبعی در محل کار برای مرجع، و راهنمای آسان برای درک توسط مدیران مبتدی و غیر RHEL.


توضیحاتی درمورد کتاب به خارجی

HIGHLIGHTS

> Covers Red Hat Enterprise Linux 8

> Covers ALL Latest Official Exam Objectives

(including Shell Scripting and Containers)

> Great for Self-Study and In-Class/Virtual Training

> 23 Chapters

> 108 Real-Life Step-By-Step Exercises and Shell Scripts

> 80 Do-It-Yourself Challenge Labs

> 408 Review Questions & Answers

> 4 Sample RHCSA Exams (23 tasks per exam)


RHCSA Red Hat Enterprise Linux 8 (UPDATED): Training and Exam Preparation Guide, Second Edition provides in-depth coverage of the latest RHCSA EX200 exam objectives that include Shell Scripting and Containers. The most definitive guide available on the subject, this book explains concepts, analyzes configuration files, describes command outputs, shows step-by-step procedures (includes screenshots of actual commands executed and outputs they produced), and challenges the readers' comprehension of the concepts and procedures by presenting plenty of additional labs and sample realistic exam tasks to perform on their own.


This book has 23 chapters that are organized logically, from setting up the lab to the fundamentals of Linux to sophisticated Linux administration topics. The book covers the topics on local RHEL 8 installation; initial interaction with the system; basic Linux commands; compression and archiving; file editing and manipulation; standard and special permissions; file searching and access controls; user monitoring and authentication files; users, groups, and password aging; bash shell features and startup files; processes and task scheduling; basic and advanced software administration techniques; system boot process and bootloader; kernel management and system initialization; logging and system tuning; basic and advanced storage management tools and solutions; local file systems and swap regions; network device and connection configuration; remote file systems and automounting; time synchronization and hostname resolution; the secure shell service; firewall and SELinux controls; and shell scripting and containers.


Each chapter highlights the major topics and relevant exam objectives at the beginning and ends with several review questions & answers and Do-It-Yourself challenge labs. Throughout the book, figures, tables, screen shots, examples, notes, and exam tips are furnished to support explanation and exam preparation. This book includes four sample RHCSA exams that are expected to be performed using the knowledge and skills attained from reading the material, following the exercises, and completing the challenge labs. The labs and the sample exams include hints to relevant topics and/or exercises.


This book may be used as a self-learning guide by RHCSA 8 exam aspirants, a resource by instructors and students to follow in physical and virtual training sessions, an on-the-job resource for reference, and an easy-to-understand guide by novice and non-RHEL administrators.



فهرست مطالب

Title Page
Copyright Page
Preface
Acknowledgments
About the Author
Conventions Used in this Book
The RHCSA 8 Exam and Exam Objectives
Taking the Exam
Exam Fee and Registration Procedure
About this Book
Table Of Contents
List of Figures
List of Tables
01.Local Installation
	A Quick Look at Linux Development
		Linux History in a Nutshell
		Linux from Red Hat
	Lab Infrastructure for Practice
		What is Needed for the Lab?
		The RHEL Installer Program
		Where Do Installation Logs Go?
		Virtual Console Screens
	Exercise 1-1: Download and Install VirtualBox Software, and Create a Virtual Machine
		Downloading and Installing VirtualBox
		Creating a Virtual Machine
	Exercise 1-2: Download and Install RHEL 8
		Downloading RHEL 8 ISO Image
		Attaching RHEL 8 ISO Image to the Virtual Machine
		Launching the Installer
		Adding Support for Keyboards and Languages
		Configuring Time & Date
		Choosing an Installation Source
		Selecting Software to be Installed
		Configuring Installation Destination
		Configuring Network and Hostname
		Beginning Installation
		Setting root Password and Creating a User Account
		Concluding Installation
		Changing Default Boot Order
		Performing Post-Installation Tasks
	Logging In and Out at the Graphical Console
		Logging In for the First Time
		Logging Out
	Exercise 1-3: Logging In from Windows
	Chapter Summary
	Review Questions
	Answers to Review Questions
	Do-It-Yourself Challenge Labs
		Lab 1-1: Build RHEL8-VM2 (server2)
02.Initial Interaction with the System
	Linux Graphical Environment
		Display/Login Manager
		Desktop Environment
	Linux Directory Structure and File Systems
		Top-Level Directories
		File System Categories
		The Root File System (/), Disk-Based
		The Boot File System (/boot), Disk-Based
		The Home Directory (/home)
		The Optional Directory (/opt)
		The UNIX System Resources Directory (/usr)
		The Variable Directory (/var)
		The Temporary Directory (/tmp)
		The Devices File System (/dev), Virtual
		The Procfs File System (/proc), Virtual
		The Runtime File System (/run), Virtual
		The System File System (/sys), Virtual
		Viewing Directory Hierarchy
	Basic System Commands
		Starting a Remote Terminal Session
		Understanding the Command Mechanics
		Listing Files and Directories
		Printing Working Directory
		Navigating Directories
		Identifying Terminal Device File
		Inspecting System’s Uptime and Processor Load
		Clearing the Screen
		Determining Command Path
		Viewing System Information
		Viewing CPU Specs
	Getting Help
		Accessing Manual Pages
		Headings in the Manual
		Manual Sections
		Searching by Keyword
		Exposing Short Description
		The info and pinfo Commands
		Documentation in the /usr/share/doc Directory
		Red Hat Enterprise Linux 8 Documentation
	Chapter Summary
	Review Questions
	Answers to Review Questions
	Do-It-Yourself Challenge Labs
		Lab 2-1: Navigate Linux Directory Tree
		Lab 2-2: Miscellaneous Tasks
		Lab 2-3: Identify System and Kernel Information
		Lab 2-4: Use Help
03.Basic File Management
	Common File Types
		Regular Files
		Directory Files
		Block and Character Special Device Files
		Symbolic Links
	Compression and Archiving
		Using gzip and gunzip
		Using bzip2 and bunzip2
		Differences between gzip and bzip2
		Using tar
		Exercise 3-1: Create Compressed Archives
	File Editing
		Modes of Operation
		Starting vim
		Inserting text
		Navigating within vim
		Deleting Text
		Undoing and Repeating
		Searching for Text
		Replacing Text
		Copying, Moving, and Pasting Text
		Changing Text
		Saving and Quitting vim
	File and Directory Operations
		Creating Files and Directories
		Displaying File Contents
		Counting Words, Lines, and Characters in Text Files
		Copying Files and Directories
		Moving and Renaming Files and Directories
		Removing Files and Directories
	File Linking
		Hard Link
		Soft Link
		Differences between Copying and Linking
		Exercise 3-2: Create and Manage Hard Links
		Exercise 3-3: Create and Manage Soft Links
	Chapter Summary
	Review Questions
	Answers to Review Questions
	Do-It-Yourself Challenge Labs
		Lab 3-1: Archive, List, and Restore Files
		Lab 3-2: Practice the vim Editor
		Lab 3-3: File and Directory Operations
04.Advanced File Management
	File and Directory Access Permissions
		Determining Access Permissions
		Permission Classes
		Permission Types
		Permission Modes
		Modifying Access Permission Bits
		Exercise 4-1: Modify Permission Bits Using Symbolic Form
		Exercise 4-2: Modify Permission Bits Using Octal Form
		Default Permissions
		Calculating Default Permissions
	Special File Permissions
		The setuid Bit on Binary Executable Files
		Exercise 4-3: Test the Effect of setuid Bit on Executable Files
		The setgid Bit on Binary Executable Files
		Exercise 4-4: Test the Effect of setgid Bit on Executable Files
		The setgid Bit on Shared Directories
		Exercise 4-5: Set up Shared Directory for Group Collaboration
		The Sticky Bit on Public and Shared Writable Directories
		Exercise 4-6: Test the Effect of Sticky Bit
	File Searching
		Using the find Command
		Using find with -exec and -ok Flags
	Access Control Lists (ACLs)
		ACL Management Commands
		The getfacl Command
		The setfacl Command
		The Role of the mask Value
		Exercise 4-7: Identify, Apply, and Erase Access ACLs
		Default ACLs
		Exercise 4-8: Apply, Identify, and Erase Default ACLs
	Chapter Summary
	Review Questions
	Answers to Review Questions
	Do-It-Yourself Challenge Labs
		Lab 4-1: Manipulate File Permissions
		Lab 4-2: Configure Group Collaboration and Prevent File Deletion
		Lab 4-3: Find Files
		Lab 4-4: Find Files Using Different Criteria
		Lab 4-5: Apply ACL Settings
05.Basic User Management
	User Login Activity and Information
		Listing Logged-In Users
		Inspecting History of Successful Login Attempts and System Reboots
		Viewing History of Failed User Login Attempts
		Reporting Recent User Login Attempts
		Examining User and Group Information
	Local User Authentication Files
		The passwd File
		The shadow File
		The group File
		The gshadow File
	The useradd and login.defs Configuration Files
	User Account Management
		The useradd, usermod, and userdel Commands
		Exercise 5-1: Create a User Account with Default Attributes
		Exercise 5-2: Create a User Account with Custom Values
		Exercise 5-3: Modify and Delete a User Account
		No-Login (Non-Interactive) User Account
		Exercise 5-4: Create a User Account with No-Login Access
	Chapter Summary
	Review Questions
	Answers to Review Questions
	Do-It-Yourself Challenge Labs
		Lab 5-1: Check User Login Attempts
		Lab 5-2: Verify User and Group Identity
		Lab 5-3: Create Users
		Lab 5-4: Create User with Non-Interactive Shell
06.Advanced User Management
	Password Aging and its Management
		The chage Command
		Exercise 6-1: Set and Confirm Password Aging with chage
		The passwd Command
		Exercise 6-2: Set and Confirm Password Aging with passwd
		The usermod Command
		Exercise 6-3: Lock and Unlock a User Account with usermod and passwd
	Linux Groups and their Management
		The groupadd, groupmod, and groupdel Commands
		Exercise 6-4: Create a Group and Add Members
		Exercise 6-5: Modify and Delete a Group Account
	Substituting Users and Doing as Superuser
		Substituting (or Switching) Users
		Doing as Superuser (or Doing as Substitute User)
	Owning User and Owning Group
		Exercise 6-6: Modify File Owner and Owning Group
	Chapter Summary
	Review Questions
	Answers to Review Questions
	Do-It-Yourself Challenge Labs
		Lab 6-1: Create User and Configure Password Aging
		Lab 6-2: Lock and Unlock User
		Lab 6-3: Modify Group
		Lab 6-4: Configure sudo Access
		Lab 6-5: Modify Owning User and Group
07.The Bash Shell
	The Bourne-Again Shell
		Shell and Environment Variables
		Setting and Unsetting Variables
		Command and Variable Substitutions
		Exercise 7-1: Modify Primary Command Prompt
		Input, Output, and Error Redirections
		History Substitution
		Editing at the Command Line
		Tab Completion
		Tilde Substitution
		Alias Substitution
		Metacharacters and Wildcard Characters
		Piping Output of One Command as Input to Another
		Quoting Mechanisms
		Regular Expressions
		Running and Controlling Jobs in Foreground and Background
	Shell Startup Files
		System-wide Shell Startup Files
		Per-user Shell Startup Files
	Chapter Summary
	Review Questions
	Answers to Review Questions
	Do-It-Yourself Challenge Labs
		Lab 7-1: Customize the Command Prompt
		Lab 7-2: Redirect the Standard Input, Output, and Error
08.Linux Processes and Task Scheduling
	Processes and Priorities
		Process States
		Viewing and Monitoring Processes with ps
		Viewing and Monitoring Processes with top
		Listing a Specific Process
		Listing Processes by User and Group Ownership
		Understanding Process Niceness and Priority
		Exercise 8-1: Start Processes at Non-Default Priorities
		Exercise 8-2: Alter Process Priorities
		Controlling Processes with Signals
	Job Scheduling
		Controlling User Access
		Scheduler Log File
		Using at
		Exercise 8-3: Submit, View, List, and Erase an at Job
		Using crontab
		Syntax of User Crontables
		Exercise 8-4: Add, List, and Erase a Cron Job
		Anacron
	Chapter Summary
	Review Questions
	Answers to Review Questions
	Do-It-Yourself Challenge Labs
		Lab 8-1: Nice and Renice a Process
		Lab 8-2: Configure a User Crontab File
09.Basic Package Management
	Package Overview
		Packages and Packaging
		Package Naming
		Package Dependency
		Package Database
		Package Management Tools
	Package Management with rpm
		The rpm Command
		Exercise 9-1: Mount RHEL 8 ISO Persistently
		Querying Packages
		Installing a Package
		Upgrading a Package
		Freshening a Package
		Overwriting a Package
		Removing a Package
		Extracting Files from an Installable Package
		Validating Package Integrity and Credibility
		Viewing GPG Keys
		Verifying Package Attributes
		Exercise 9-2: Perform Package Management Using rpm
	Chapter Summary
	Review Questions
	Answers to Review Questions
	Do-It-Yourself Challenge Labs
		Lab 9-1: Install and Verify Packages
		Lab 9-2: Query and Erase Packages
10.Advanced Package Management
	Advanced Package Management Concepts
		Package Groups
		Application Streams and Modules
		BaseOS Repository
		AppStream Repository
		Benefits of Segregation
		Module Streams
		Module Profiles
		dnf/yum Repository
	Software Management with dnf
		dnf Configuration File
		The dnf Command
		Exercise 10-1: Configure Access to Pre-Built Repositories
	Individual Package Management
		Listing Available and Installed Packages
		Installing and Updating Packages
		Exhibiting Package Information
		Removing Packages
		Exercise 10-2: Manipulate Individual Packages
		Determining Provider and Searching Package Metadata
	Package Group Management
		Listing Available and Installed Package Groups
		Installing and Updating Package Groups
		Removing Package Groups
		Exercise 10-3: Manipulate Package Groups
	Module Management
		Listing Available and Installed Modules
		Installing and Updating Modules
		Displaying Module Information
		Removing Modules
		Exercise 10-4: Manipulate Modules
		Switching Module Streams
		Exercise 10-5: Install a Module from an Alternative Stream
	Chapter Summary
	Review Questions
	Answers to Review Questions
	Do-It-Yourself Challenge Labs
		Lab 10-1: Configure Access to RHEL 8 Repositories
		Lab 10-2: Install and Manage Individual Packages
		Lab 10-3: Install and Manage Package Groups
		Lab 10-4: Install and Manage Modules
		Lab 10-5: Switch Module Streams and Install Software
11.Boot Process, GRUB2, and the Linux Kernel
	Linux Boot Process
		The Firmware Phase (BIOS and UEFI)
		The Bootloader Phase
		The Kernel Phase
		The Initialization Phase
	The GRUB2 Bootloader
		Interacting with GRUB2
		Understanding GRUB2 Configuration Files
		Exercise 11-1: Change Default System Boot Timeout
		Booting into Specific Targets
		Exercise 11-2: Reset the root User Password
	The Linux Kernel
		Kernel Packages
		Analyzing Kernel Version
		Understanding Kernel Directory Structure
		Installing the Kernel
		Exercise 11-3: Download and Install a New Kernel
	Chapter Summary
	Review Questions
	Answers to Review Questions
	Do-It-Yourself Challenge Labs
		Lab 11-1: Enable Verbose System Boot
		Lab 11-2: Reset root User Password
		Lab 11-3: Install New Kernel
12.System Initialization, Message Logging, and System Tuning
	System Initialization and Service Management
		Units
		Targets
		The systemctl Command
		Listing and Viewing Units
		Managing Service Units
		Managing Target Units
	System Logging
		The Syslog Configuration File
		Rotating Log Files
		The Boot Log File
		The System Log File
		Logging Custom Messages
	The systemd Journal
		Retrieving and Viewing Messages
		Preserving Journal Information
		Exercise 12-1: Configure Persistent Storage for Journal Information
	System Tuning
		Tuning Profiles
		The tuned-adm Command
		Exercise 12-2: Manage Tuning Profiles
	Chapter Summary
	Review Questions
	Answers to Review Questions
	Do-It-Yourself Challenge Labs
		Lab 12-1: Modify Default Boot Target
		Lab 12-2: Record Custom Alerts
		Lab 12-3: Apply Tuning Profile
13. Basic Storage Partitioning
	Storage Management Overview
		Master Boot Record (MBR)
		GUID Partition Table (GPT)
		Disk Partitions
		Storage Management Tools
		Thin Provisioning
		Adding Storage for Practice
		Exercise 13-1: Add Required Storage to server2
	MBR Storage Management with parted
		Exercise 13-2: Create an MBR Partition
		Exercise 13-3: Delete an MBR Partition
	GPT Storage Management with gdisk
		Exercise 13-4: Create a GPT Partition
		Exercise 13-5: Delete a GPT Partition
	Storage Optimization with Virtual Data Optimizer (VDO)
		How VDO Conserves Storage Space
		Creating and Managing VDO Volumes
		Exercise 13-6: Install Software and Activate VDO
		Exercise 13-7: Create a VDO Volume
		Exercise 13-8: Delete a VDO Volume
	Chapter Summary
	Review Questions
	Answers to Review Questions
	Do-It-Yourself Challenge Labs
		Lab 13-1: Create and Remove Partitions with parted
		Lab 13-2: Create and Remove Partitions with gdisk
		Lab 13-3: Create and Delete VDO Volumes
		Lab 13-4: Disable and Enable VDO Volume Features
14.Advanced Storage Partitioning
	Logical Volume Manager (LVM)
		Physical Volume
		Volume Group
		Physical Extent
		Logical Volume
		Logical Extent
		LVM Operations and Commands
		Exercise 14-1: Create a Physical Volume and Volume Group
		Exercise 14-2: Create Logical Volumes
		Exercise 14-3: Extend a Volume Group and a Logical Volume
		Exercise 14-4: Rename, Reduce, Extend, and Remove Logical Volumes
		Exercise 14-5: Reduce and Remove a Volume Group
		Exercise 14-6: Uninitialize Physical Volumes
	Stratis Volume-Managing File System
		Stratis Management Operations and Command
		Exercise 14-7: Install Software and Activate Stratis
		Exercise 14-8: Create and Confirm a Pool and File System
		Exercise 14-9: Expand and Rename a Pool and File System
		Exercise 14-10: Destroy a File System and Pool
	Chapter Summary
	Review Questions
	Answers to Review Questions
	Do-It-Yourself Challenge Labs
		Lab 14-1: Create Volume Group and Logical Volumes
		Lab 14-2: Expand Volume Group and Logical Volume
		Lab 14-3: Reduce and Remove Logical Volumes
		Lab 14-4: Remove Volume Group and Physical Volumes
		Lab 14-5: Create Stratis Pool
		Lab 14-6: Expand and Destroy Stratis Pool
15.Local File Systems and Swap
	File Systems and File System Types
		Extended File Systems
		XFS File System
		VFAT File System
		ISO9660 File System
	File System Management
		File System Administration Commands
		Mounting and Unmounting File Systems
		Determining the UUID of a File System
		Labeling a File System
		Automatically Mounting a File System at Reboots
		Monitoring File System Usage
		Calculating Disk Usage
		Exercise 15-1: Create and Mount Ext4, VFAT, and XFS File Systems in Partitions
		Exercise 15-2: Create and Mount XFS File System in VDO Volume
		Exercise 15-3: Create and Mount Ext4 and XFS File Systems in LVM Logical Volumes
		Exercise 15-4: Resize Ext4 and XFS File Systems in LVM Logical Volumes
		Exercise 15-5: Create, Mount, and Expand XFS File System in Stratis Volume
	Swap and its Management
		Determining Current Swap Usage
		Prioritizing Swap Spaces
		Swap Administration Commands
		Exercise 15-6: Create and Activate Swap in Partition and Logical Volume
	Chapter Summary
	Review Questions
	Answers to Review Questions
	Do-It-Yourself Challenge Labs
		Lab 15-1: Create VFAT, Ext4, and XFS File Systems in Partitions & Mount Persistently
		Lab 15-2: Create XFS File System in VDO Volume and Mount Persistently
		Lab 15-3: Create Ext4 and XFS File Systems in LVM Volumes and Mount Persistently
		Lab 15-4: Extend Ext4 and XFS File Systems in LVM Volumes
		Lab 15-5: Create XFS File System in Stratis Volume and Mount Persistently
		Lab 15-6: Create Swap in Partition and LVM Volume and Activate Persistently
16.Networking, Network Devices, and Network Connections
	Networking Fundamentals
		Hostname
		Exercise 16-1: Change System Hostname
		IPv4 Address
		Network Classes
		Subnetting
		Subnet Mask
		Classless Inter-Domain Routing (CIDR) Notation
		Protocol
		TCP and UDP Protocols
		Well-Known Ports
		ICMP Protocol
		Ethernet Address
		IPv6 Address
		Major Differences between IPv4 and IPv6
	Network Devices and Connections
		Consistent Network Device Naming
		Understanding Interface Connection Profile
		Exercise 16-2: Add Network Devices to server10 and server20
		Network Device and Connection Administration Tools
		Exercise 16-3: Configure New Network Connection Manually
		The NetworkManager Service
		The nmcli Command
		Exercise 16-4: Configure New Network Connection Using nmcli
		Understanding Hosts Table
		Testing Network Connectivity
		Exercise 16-5: Update Hosts Table and Test Connectivity
	Chapter Summary
	Review Questions
	Answers to Review Questions
	Do-It-Yourself Challenge Labs
		Lab 16-1: Add New Interface and Configure Connection Profile with nmcli
		Lab 16-2: Add New Interface and Configure Connection Profile Manually
17.Network File System
	Network File System
		Benefits of Using NFS
		NFS Versions
	NFS Server and Client Configuration
		Exercise 17-1: Export Share on NFS Server
		Exercise 17-2: Mount Share on NFS Client
	Auto File System (AutoFS)
		Benefits of Using AutoFS
		How AutoFS Works
		AutoFS Configuration File
		AutoFS Maps
		Exercise 17-3: Access NFS Share Using Direct Map
		Exercise 17-4: Access NFS Share Using Indirect Map
		Automounting User Home Directories
		Exercise 17-5: Automount User Home Directories Using Indirect Map
	Chapter Summary
	Review Questions
	Answers to Review Questions
	Do-It-Yourself Challenge Labs
		Lab 17-1: Configure NFS Share and Automount with Direct Map
		Lab 17-2: Automount NFS Share with Indirect Map
18.Time Synchronization and Hostname Resolution
	Time Synchronization
		Time Sources
		NTP Roles
		Stratum Levels
		Chrony Configuration File
		Chrony Daemon and Command
		Exercise 18-1: Configure NTP Client
		Displaying and Setting System Date and Time
	DNS and Name Resolution
		DNS Name Space and Domains
		DNS Roles
		Understanding Resolver Configuration File
		Performing Name Resolution with dig
		Performing Name Resolution with host
		Performing Name Resolution with nslookup
		Performing Name Resolution with getent
	Chapter Summary
	Review Questions
	Answers to Review Questions
	Do-It-Yourself Challenge Labs
		Lab 18-1: Modify System Date and Time
		Lab 18-2: Configure Chrony
19.The Secure Shell Service
	The OpenSSH Service
		Common Encryption Techniques
		Authentication Methods
		OpenSSH Protocol Version and Algorithms
		OpenSSH Packages
		OpenSSH Server Daemon and Client Commands
		Server Configuration File
		Client Configuration File
	System Access and File Transfer
		Exercise 19-1: Access RHEL System from Another RHEL System
		Exercise 19-2: Generate, Distribute, and Use SSH Keys
		Executing Commands Remotely Using ssh
		Copying Files Remotely Using scp
		Transferring Files Remotely Using sftp
		Synchronizing Files Remotely Using rsync
	Chapter Summary
	Review Questions
	Answers to Review Questions
	Do-It-Yourself Challenge Labs
		Lab 19-1: Establish Key-Based Authentication
		Lab 19-2: Test the Effect of PermitRootLogin Directive
20.The Linux Firewall
	Firewall Overview
		Overview of firewalld
		firewalld Zones
		Zone Configuration Files
		firewalld Services
		Service Configuration Files
	Firewall Management
		The firewall-cmd Command
		Querying the Operational Status of firewalld
		Exercise 20-1: Add Services and Ports, and Manage Zones
		Exercise 20-2: Remove Services and Ports, and Manage Zones
		Exercise 20-3: Test the Effect of Firewall Rule
	Chapter Summary
	Review Questions
	Answers to Review Questions
	Do-It-Yourself Challenge Labs
		Lab 20-1: Add Service to Firewall
		Lab 20-2: Add Port Range to Firewall
21.Security Enhanced Linux
	Security Enhanced Linux
		Terminology
		SELinux Contexts for Users
		SELinux Contexts for Processes
		SELinux Contexts for Files
		Copying, Moving, and Archiving Files with SELinux Contexts
		SELinux Contexts for Ports
		Domain Transitioning
		SELinux Booleans
	SELinux Administration
		Management Commands
		Viewing and Controlling SELinux Operational State
		Querying Status
		Exercise 21-1: Modify SELinux File Context
		Exercise 21-2: Add and Apply File Context
		Exercise 21-3: Add and Delete Network Ports
		Exercise 21-4: Copy Files with and without Context
		Exercise 21-5: View and Toggle SELinux Boolean Values
		Monitoring and Analyzing SELinux Violations
	Chapter Summary
	Review Questions
	Answers to Review Questions
	Do-It-Yourself Challenge Labs
		Lab 21-1: Disable and Enable the SELinux Operating Mode
		Lab 21-2: Modify Context on Files
		Lab 21-3: Add Network Port to Policy Database
		Lab 21-4: Copy Files with and without Context
		Lab 21-5: Flip SELinux Booleans
22.Shell Scripting
	Shell Scripts
		Script01: Displaying System Information
		Executing a Script
		Debugging a Script
		Script02: Using Local Variables
		Script03: Using Pre-Defined Environment Variables
		Script04: Using Command Substitution
		Understanding Shell Parameters
		Script05: Using Special and Positional Parameters
		Script06: Shifting Command Line Arguments
	Logical Constructs
		Exit Codes
		Test Conditions
		The if-then-fi Construct
		Script07: The if-then-fi Construct
		The if-then-else-fi Construct
		Script08: The if-then-else-fi Construct
		The if-then-elif-fi Construct
		Script09: The if-then-elif-fi Construct (Example 1)
		Script10: The if-then-elif-fi Construct (Example 2)
	Looping Constructs
		Test Conditions
		The for Loop
		Script11: Print Alphabets Using for Loop
		Script12: Create Users Using for Loop
	Chapter Summary
	Review Questions
	Answers to Review Questions
	DIY Challenge Labs
		Lab 22-1: Write a Script to Create Logical Volumes
		Lab 22-2: Write a Script to Create File Systems
		Lab 22-3: Write a Script to Configure a New Network Profile
23.Containers
	Introduction to Containers
		Containers and the Linux Features
		Benefits of Using Containers
		Container Home: Bare Metal or Virtual Machine
		Container Images and Container Registries
		Root vs. Rootless Containers
	Working with Images and Containers
		Exercise 23-1: Install Necessary Container Support
		The podman Command
		The skopeo Command
		The registries.conf File
		Viewing Podman Configuration and Version
	Image Management
		Exercise 23-2: Search, Examine, Download, and Remove an Image
	Basic Container Management
		Exercise 23-3: Run, Interact with, and Remove a Named Container
		Exercise 23-4: Run a Nameless Container and Auto-Remove it After Entry Point Command Execution
	Advanced Container Management
		Containers and Port Mapping
		Exercise 23-5: Configure Port Mapping
		Exercise 23-6: Stop, Restart, and Remove a Container
		Containers and Environment Variables
		Exercise 23-7: Pass and Set Environment Variables
		Containers and Persistent Storage
		Exercise 23-8: Attach Persistent Storage and Access Data Across Containers
		Container State Management with systemd
		Exercise 23-9: Configure a Root Container as a systemd Service
		Exercise 23-10: Configure a Rootless Container as a systemd Service
	Chapter Summary
	Review Questions
	Answers to Review Questions
	DIY Challenge Labs
		Lab 23-1: Prepare to Launch Containers
		Lab 23-2: Launch a Named Root Container with Port Mapping
		Lab 23-3: Launch a Nameless Rootless Container with Two Variables
		Lab 23-4: Launch a Named Rootless Container with Persistent Storage
		Lab 23-5: Launch a Named Rootless Container with Port Mapping, Environment Variables, and Persistent Storage
		Lab 23-6: Control Rootless Container States via systemd
		Lab 23-7: Control Root Container States via systemd
Appendix A: Sample RHCSA Exam 1
Appendix B: Sample RHCSA Exam 2
Appendix C: Sample RHCSA Exam 3
Appendix D: Sample RHCSA Exam 4
Bibliography
Glossary
Index




نظرات کاربران