RH403VT – Red Hat Satellite 6 Administration

Course description

Learn how to configure Red Hat Satellite 6 to deploy and manage Red Hat Enterprise Linux systems and software

Red Hat Satellite 6 Administration (RH403) is a lab-based course that explores the concepts and methods necessary for successful large-scale management of Red Hat® Enterprise Linux® systems. You will learn how to configure Red Hat Satellite 6 on a server and populate it with software packages. You will use Red Hat Satellite to manage the software development life cycle of a subscribed host and its configuration, and learn how to provision hosts integrated with software and Ansible® configuration management upon deployment.

This course is based on Red Hat Enterprise Linux 8 and Red Hat Satellite 6.11.

Following course completion, you will receive a 45-day extended access to hands-on labs for any course that includes a virtual environment.Note: This course is offered as a five day virtual class or self-paced. Durations may vary based on the delivery. For full course details, scheduling, and pricing, select your location then “get started” on the right hand menu.

Course content summary

  • Verify a Red Hat Satellite 6.11 installation.
  • Regulate Red Hat Satellite with organizations, locations, users, and roles.
  • Manage software with Red Hat Satellite environments and content views.
  • Use Red Hat Satellite to configure hosts with Ansible playbooks and roles.
  • Provision hosts with integrated software and configuration management.
  • Implement Metal-as-a-Service (MaaS) with Satellite discovery and provisioning of unprovisioned hosts.

Audience for this course

  • Senior Red Hat Enterprise Linux system administrators responsible for the management of multiple servers and hybrid cloud enterprises up to a very large scale

Recommended for this course

  • Achieve Red Hat Certified Engineer (RHCE) certification, or equivalent experience.
  • Candidates are recommended but not required to have familiarity with Red Hat Satellite 6.

Technology considerations

  • Internet access is not required.

CL210VT – Red Hat OpenStack Administration II: Day 2 Operation[...]

Course description

Build advanced skills for performing Red Hat OpenStack Platform day 2 operations and management of hybrid cloud infrastructure

Red Hat OpenStack Administration II: Day 2 Operations for Cloud Operators (CL210) is designed for cloud operators, service administrators, and automation engineers who operate and manage a full-featured hybrid and private cloud-computing environment using Red Hat OpenStack Platform. You will learn how to manage, monitor, troubleshoot, and scale a Red Hat OpenStack Platform infrastructure. This course focuses on using the OpenStack Client command-line user interface to configure metrics, policies, and architecture in order to support enterprise cloud applications and daily operations.

This course is based on Red Hat OpenStack version 16.1 and Red Hat Enterprise Linux version 8.2

Following course completion, you will receive a 45-day extended access to hands-on labs for any course that includes a virtual environment.Note: This course is offered as a five day virtual class or self-paced. Durations may vary based on the delivery. For full course details, scheduling, and pricing, select your location then “get started” on the right hand menu.

Course content summary

  • Managing overcloud service containerization technology.
  • Providing metrics for performance tuning and governance.
  • Monitoring and troubleshooting Open Virtual Networking (OVN) network flow.
  • Configuring Identity service using an external Red Hat IdM store.
  • Managing the core control plane, including Pacemaker.
  • Customizing images, with techniques for multiple use cases.
  • Managing block and object storage back-ends.
  • Managing compute nodes, including tuning and hyperconverged.
  • Troubleshooting Red Hat OpenStack Platform.

Audience for this course

  • Cloud operators responsible for managing daily operations and automation.
  • Infrastructure architects interested in or responsible for maintaining a large-scale private or hybrid cloud.

Prerequisites for this course

Technology considerations

  • There are no current special requirements or technical considerations.
  • No BYOD support.
  • No Internet access required.

RH362VT – Red Hat Security: Identity Management and Authentica[...]

Provide help to secure, centralized identity management services to coordinate user authentication and authorization with client systems, network services, and Windows domains.

Course Description

Red Hat Security: Identity Management and Authentication (RH362) provides the skills to configure and manage Identity Management (IdM), the comprehensive identity management component bundled with Red Hat Enterprise Linux. This course helps students to gain the skills with this technology most requested by customers.

Some topics covered in this course are central management and provisioning of user accounts; design and installation of IdM server topologies; operation of the integrated DNS and TLS Certificate Authority services; management of two-factor authentication, smart card authentication, and operation as a single-sign on provider; integration and management of two-way trusts with Active Directory; and troubleshooting and disaster recovery planning. Registration of Linux clients to IdM and operation in enterprise environments that use both Linux and Microsoft Windows clients and servers is discussed.

Following course completion, you will receive a 45-day extended access to hands-on labs for any course that includes a virtual environment.

  • Design an Identity Management topology for scale and resiliency.
  • Describe key technologies used by IdM, including SSSD, PAM, Kerberos, and PKI.
  • Install Identity Management (IdM) servers, replicas, and clients using Ansible Playbooks.
  • Manage IdM services, including integrated DNS and CA.
  • Configure and manage Kerberos authentication and secure services.
  • Configure and manage TLS certificates.
  • Create and manage a trust relationship with Microsoft Active Directory.
  • Configure to help secure user authentication, including two-factor authentication and single sign-on.
  • Configure and manage Sudo, HBAC, and RBAC policies.
  • Manage secrets, vaults, certificates, and keys.
  • Troubleshoot identity management.
  • Integrate Satellite 6 and Red Hat Ansible Automation Platform with IdM.
  • Configure IdM backup and recovery.

Audience for this course

  • Red Hat Certified System Engineers (RHCE) who wish to learn how to provision and configure centralized identity management solutions for Linux clients and how to integrate them with other network services and identity management systems.
    • Identity Management specialists or engineers
    • Access Management specialists or engineers

Recommended training

  • Take our free assessment to gauge whether this offering is the best fit for your skills.
  • An RHCE certification or equivalent skill is a prerequisite to this course.

Technology considerations

  • There are no special requirements other than those needed for standard courses delivered in ILT/VT/ROLE/RHLS delivery modes.

RH415VT – Red Hat Security: Linux in Physical, Virtual, and Cl[...]

The „Red Hat Security: Linux in Physical, Virtual, and Cloud“ (RH415) course is designed for security and system administration personnel who manage the secure operation of computer systems running Red Hat Enterprise Linux on physical hardware, as virtual machines, or as cloud instances both in private data centers and on public cloud platforms.

Course description

  • Maintaining the security of computing systems is a process of managing risk through the implementation of processes and standards backed by technologies and tools. „Red Hat Security: Linux in Physical, Virtual, and Cloud“ (RH415) is designed for security administrators and system administrators who need to manage the secure operation of servers running Red Hat Enterprise Linux, whether deployed on physical hardware, as virtual machines, or as cloud instances. You will learn about technologies and tools that can be used to help you implement and comply with your security requirements, including the kernel’s Audit subsystem, AIDE, SELinux, OpenSCAP and SCAP Workbench, USBGuard, PAM authentication, and Network-Based Device Encryption. You will learn to monitor compliance and to proactively identify, prioritize, and resolve issues by using OpenSCAP, Red Hat Insights, Red Hat Satellite, and Red Hat Ansible Automation Platform. You will have a basic introduction to how Red Hat Ansible Automation Platform automates the deployment of remediation to systems, by using Ansible Playbooks from OpenSCAP or Red Hat Insights.
  • This course is based on RHEL 9.2, Ansible Core 2.14, Red Hat Ansible Automation Platform 2.4, Satellite 6.14, and OpenSCAP 1.3.7.
  • Maintaining the security of computing systems is a process of managing risk through the implementation of processes and standards backed by technologies and tools. In this course, you will learn about resources that can be used to help you implement and comply with your security requirements.
  • Following course completion, you will receive a 45-day extended access to hands-on labs for any course that includes a virtual environment.
  • Note: This course is offered as a five day virtual class or self-paced. Durations may vary based on the delivery. For full course details, scheduling, and pricing, select your location then “get started” on the right hand menu.

Course summary

  • Manage compliance with OpenSCAP.
  • Enable SELinux on a server from a disabled state, perform basic analysis of the system policy, and mitigate risk with advanced SELinux techniques.
  • Proactively identify and resolve issues with Red Hat Insights.
  • Monitor activity and changes on a server with Linux Audit and AIDE.
  • Protect data from compromise with USBGuard and storage encryption.
  • Manage authentication controls with PAM.
  • Manually apply provided Ansible Playbooks to automate mitigation of security and compliance issues.
  • Scale OpenSCAP and Red Hat Insights management with Red Hat Satellite and Red Hat Ansible Automation Platform.

Target Audience

  • System Administrator – responsible for supporting the company’s physical and virtual infrastructure, systems, and servers
  • IT Security Practitioner / Compliance & Auditor – responsible for ensuring the technology environment is protected from attacks and is in compliance with security/privacy rules and regulations.
  • Automation Architect – Engineer or architect responsible for the company’s automation development and optimizing cloud tools and infrastructure to achieve automation goals.

Recommended training

  • Take our free assessment to gauge whether this offering is the best fit for your skills.
  • Red Hat Certified Engineer (EX294 / RHCE) certification or equivalent Red Hat Enterprise Linux knowledge and experience.

Technology considerations

  • If the instructor intends to demonstrate Red Hat Insights, internet access and appropriate entitlements are required.

CL110VT – Red Hat OpenStack Administration I: Core Operations [...]

Course description

Learn to operate a Red Hat® OpenStack Platform private cloud and manage domain resources to secure and deploy modern, scalable cloud applications, networks and storage

Red Hat OpenStack Administration I: Core Operations for Domain Operators (CL110) teaches you how to operate and manage a production Red Hat OpenStack Platform (RHOSP) single-site overcloud. You will learn how to create secure project environments in which to provision resources and manage security privileges that cloud users need to deploy scalable cloud applications. You will learn about OpenShift integration with load balancers, identity management, monitoring, proxies, and storage. You will also develop more troubleshooting and Day 2 operations skills in this course.

This course is based on Red Hat OpenStack Platform 16.1.

Following course completion, you will receive a 45-day extended access to hands-on labs for any course that includes a virtual environment.Note: This course is offered as a five day virtual class or self-paced. Durations may vary based on the delivery. For full course details, scheduling, and pricing, select your location then “get started” on the right hand menu.

Course content summary

Students in the Red Hat OpenStack Administration I: Core Operations for Domain Operators (CL110) course will focus on performing both routine and specialized tasks that are necessary to manage a production OpenStack overcloud domain. Students will manage OpenStack using both web-based and command-line interfaces. Essential skills covered in the course include the following:

  • Launch instances to satisfy various use case examples.
  • Manage domains, projects, users, roles, and quota in a multitenant environment.
  • Manage networks, subnets, routers, and floating IP addresses.
  • Manage instance security with group rules and access keys.
  • Create and manage block, object and shared storage within OpenStack.
  • Perform instance launch customization with cloud-init.
  • Deploy scalable applications using stack templates.

Audience for this course

This course is designed for cloud users who deploy application instances and stacks, domain operators who manage resources and security for cloud users, and any other cloud personnel interested in, or responsible for, maintaining applications on private or hybrid OpenStack clouds. Any cloud persona, or personnel with roles that include performing technology evaluation, should attend this course to learn RHOSP operation and application deployment methods.

Prerequisites for this course

RH436VT – Red Hat High Availability Clustering

Course description

Deploy reliable, available critical production services in a high availability cluster

In the Red Hat High Availability Clustering (RH436) course, you will learn how to provide highly available network services to a mission-critical enterprise environment through the deployment and management of shared storage and server clusters. Created for senior Linux system administrators, this 4-day course strongly emphasizes lab-based activities.

You will set up a cluster of systems running the Pacemaker component of the Red Hat Enterprise Linux High-Availability Add-On, and deploy Linux-based services such as web servers and databases on that cluster. Cluster storage components from the Resilient Storage Add-On are also covered; installations and applications that require multiple cluster nodes can access the same storage simultaneously. This includes Logical Volume Manager (LVM) Shared Volume Groups, Red Hat Global File System 2 (GFS2), and Device-Mapper Multipath.

This course is based on Red Hat Enterprise Linux 8.3.

Following course completion, you will receive a 45-day extended access to hands-on labs for any course that includes a virtual environment.Note: This course is offered as a five day virtual class or self-paced. Durations may vary based on the delivery. For full course details, scheduling, and pricing, select your location then “get started” on the right hand menu.

Course content summary

  • Install and configure a Pacemaker-based high availability cluster.
  • Create and manage highly available services.
  • Troubleshoot common cluster issues.
  • Work with shared storage (iSCSI) and configure multipathing.
  • Implement Logical Volume Manager (LVM) in cluster-aware configurations.
  • Configure GFS2 file systems on storage shared by multiple nodes.

Audience for this course

  • Senior Linux system administrators who use high-availability clustering and fault-tolerant shared storage technologies to maximize resiliency of production services.

Prerequisites for this course

Technology considerations 

  • Internet access is required.

RH415 – Red Hat Security: Linux in Physical, Virtual, and Clou[...]

The „Red Hat Security: Linux in Physical, Virtual, and Cloud“ (RH415) course is designed for security and system administration personnel who manage the secure operation of computer systems running Red Hat Enterprise Linux on physical hardware, as virtual machines, or as cloud instances both in private data centers and on public cloud platforms.

Course description

  • Maintaining the security of computing systems is a process of managing risk through the implementation of processes and standards backed by technologies and tools. „Red Hat Security: Linux in Physical, Virtual, and Cloud“ (RH415) is designed for security administrators and system administrators who need to manage the secure operation of servers running Red Hat Enterprise Linux, whether deployed on physical hardware, as virtual machines, or as cloud instances. You will learn about technologies and tools that can be used to help you implement and comply with your security requirements, including the kernel’s Audit subsystem, AIDE, SELinux, OpenSCAP and SCAP Workbench, USBGuard, PAM authentication, and Network-Based Device Encryption. You will learn to monitor compliance and to proactively identify, prioritize, and resolve issues by using OpenSCAP, Red Hat Insights, Red Hat Satellite, and Red Hat Ansible Automation Platform. You will have a basic introduction to how Red Hat Ansible Automation Platform automates the deployment of remediation to systems, by using Ansible Playbooks from OpenSCAP or Red Hat Insights.
  • This course is based on RHEL 9.2, Ansible Core 2.14, Red Hat Ansible Automation Platform 2.4, Satellite 6.14, and OpenSCAP 1.3.7.
  • Maintaining the security of computing systems is a process of managing risk through the implementation of processes and standards backed by technologies and tools. In this course, you will learn about resources that can be used to help you implement and comply with your security requirements.
  • Following course completion, you will receive a 45-day extended access to hands-on labs for any course that includes a virtual environment..

Course summary

  • Manage compliance with OpenSCAP.
  • Enable SELinux on a server from a disabled state, perform basic analysis of the system policy, and mitigate risk with advanced SELinux techniques.
  • Proactively identify and resolve issues with Red Hat Insights.
  • Monitor activity and changes on a server with Linux Audit and AIDE.
  • Protect data from compromise with USBGuard and storage encryption.
  • Manage authentication controls with PAM.
  • Manually apply provided Ansible Playbooks to automate mitigation of security and compliance issues.
  • Scale OpenSCAP and Red Hat Insights management with Red Hat Satellite and Red Hat Ansible Automation Platform.

Target Audience

  • System Administrator – responsible for supporting the company’s physical and virtual infrastructure, systems, and servers
  • IT Security Practitioner / Compliance & Auditor – responsible for ensuring the technology environment is protected from attacks and is in compliance with security/privacy rules and regulations.
  • Automation Architect – Engineer or architect responsible for the company’s automation development and optimizing cloud tools and infrastructure to achieve automation goals.

Recommended training

  • Take our free assessment to gauge whether this offering is the best fit for your skills.
  • Red Hat Certified Engineer (EX294 / RHCE) certification or equivalent Red Hat Enterprise Linux knowledge and experience.

Technology considerations

  • If the instructor intends to demonstrate Red Hat Insights, internet access and appropriate entitlements are required.

RH436 – Red Hat High Availability Clustering

Course description

Deploy reliable, available critical production services in a high availability cluster

In the Red Hat High Availability Clustering (RH436) course, you will learn how to provide highly available network services to a mission-critical enterprise environment through the deployment and management of shared storage and server clusters. Created for senior Linux system administrators, this 4-day course strongly emphasizes lab-based activities.

You will set up a cluster of systems running the Pacemaker component of the Red Hat Enterprise Linux High-Availability Add-On, and deploy Linux-based services such as web servers and databases on that cluster. Cluster storage components from the Resilient Storage Add-On are also covered; installations and applications that require multiple cluster nodes can access the same storage simultaneously. This includes Logical Volume Manager (LVM) Shared Volume Groups, Red Hat Global File System 2 (GFS2), and Device-Mapper Multipath.

This course is based on Red Hat Enterprise Linux 8.3.

Following course completion, you will receive a 45-day extended access to hands-on labs for any course that includes a virtual environment.Note: This course is offered as a five day virtual class or self-paced. Durations may vary based on the delivery. For full course details, scheduling, and pricing, select your location then “get started” on the right hand menu.

Course content summary

  • Install and configure a Pacemaker-based high availability cluster.
  • Create and manage highly available services.
  • Troubleshoot common cluster issues.
  • Work with shared storage (iSCSI) and configure multipathing.
  • Implement Logical Volume Manager (LVM) in cluster-aware configurations.
  • Configure GFS2 file systems on storage shared by multiple nodes.

Audience for this course

  • Senior Linux system administrators who use high-availability clustering and fault-tolerant shared storage technologies to maximize resiliency of production services.

Prerequisites for this course

Technology considerations 

  • Internet access is required.

RH362 – Red Hat Security: Identity Management and Active Direc[...]

Provide help to secure, centralized identity management services to coordinate user authentication and authorization with client systems, network services, and Windows domains.

Course Description

Red Hat Security: Identity Management and Authentication (RH362) provides the skills to configure and manage Identity Management (IdM), the comprehensive identity management component bundled with Red Hat Enterprise Linux. This course helps students to gain the skills with this technology most requested by customers.

Some topics covered in this course are central management and provisioning of user accounts; design and installation of IdM server topologies; operation of the integrated DNS and TLS Certificate Authority services; management of two-factor authentication, smart card authentication, and operation as a single-sign on provider; integration and management of two-way trusts with Active Directory; and troubleshooting and disaster recovery planning. Registration of Linux clients to IdM and operation in enterprise environments that use both Linux and Microsoft Windows clients and servers is discussed.

Following course completion, you will receive a 45-day extended access to hands-on labs for any course that includes a virtual environment.

Course Content Summary

  • Design an Identity Management topology for scale and resiliency.
  • Describe key technologies used by IdM, including SSSD, PAM, Kerberos, and PKI.
  • Install Identity Management (IdM) servers, replicas, and clients using Ansible Playbooks.
  • Manage IdM services, including integrated DNS and CA.
  • Configure and manage Kerberos authentication and secure services.
  • Configure and manage TLS certificates.
  • Create and manage a trust relationship with Microsoft Active Directory.
  • Configure to help secure user authentication, including two-factor authentication and single sign-on.
  • Configure and manage Sudo, HBAC, and RBAC policies.
  • Manage secrets, vaults, certificates, and keys.
  • Troubleshoot identity management.
  • Integrate Satellite 6 and Red Hat Ansible Automation Platform with IdM.
  • Configure IdM backup and recovery.

Audience for this course

  • Red Hat Certified System Engineers (RHCE) who wish to learn how to provision and configure centralized identity management solutions for Linux clients and how to integrate them with other network services and identity management systems.
    • Identity Management specialists or engineers
    • Access Management specialists or engineers

Recommended training

  • Take our free assessment to gauge whether this offering is the best fit for your skills.
  • An RHCE certification or equivalent skill is a prerequisite to this course.

Technology considerations

  • There are no special requirements other than those needed for standard courses delivered in ILT/VT/ROLE/RHLS delivery modes.

RH342 – Red Hat Enterprise Linux Diagnostics and Troubleshooti[...]

Course description

Diagnose problems, gather information, and fix common issues with Red Hat Enterprise Linux

The Red Hat Enterprise Linux Diagnostics and Troubleshooting course (RH342) provides system administrators with the tools and techniques they need to successfully diagnose, and fix, a variety of potential issues. Students will work through hands-on problems in various subsystems to diagnose and fix common issues.

Students will learn how to apply the scientific method to a structured form of troubleshooting. This approach is then used troubleshooting various types of problems, including boot issues, hardware issues, storage issues, RPM issues, network issues, third-party application issues, security issues, and kernel issues. At the end of the course students can complete various comprehensive review labs to test their skills.

This course is based on Red Hat Enterprise Linux 8.4.

Following course completion, you will receive a 45-day extended access to hands-on labs for any course that includes a virtual environment.Note: This course is offered as a five day virtual class or self-paced. Durations may vary based on the delivery. For full course details, scheduling, and pricing, select your location then “get started” on the right hand menu.

Course content summary

  • Use the scientific method to approach troubleshooting
  • Troubleshoot boot issues
  • Troubleshoot security issues
  • Troubleshoot storage issues
  • Troubleshoot network issues

Audience for this course

The Red Hat Enterprise Linux Diagnostics and Troubleshooting course is aimed at senior system administrators who wish to learn more about troubleshooting.

Prerequisites for this course

Red Hat recommends these prerequisites: