System Engineer-(Rhcsa + Rhce)

Basic Commands / Structure

  • Navigating the Filesystem using linux commands

  • Managing files using commands (cat,find,chmod)

  • System Monitoring and Management

  • Managing and configuring Network through Commands

  • Package management on Red Hat-based system (yum,rpm,dnf)

  • File compression and archiving (tar, gzip, zip, unzip)

  • Ubuntu Installation Commands

  • Installation 3 methods

  • Rhel 6 7 8 9 distinguish

Editor - Vi/Vim,Nano

  • Nano editor,Vi/Vim Editors

  • Editing files in insert mode

  • Understanding visual mode

  • Difference between vi and vim

  • Understanding how to Navigate around files

  • Command abbreviation

  • performing backup and recovery

  • opening multiple file tabs

Runlevels

  • Role of runlevels in system boot and shutdown.

  • omparison of SysVinit and Systemd.

  • Rebooting the system using runlevels..

  • Changing runlevels using init cmd

Ownership & Permission

  • Creating and managing user accounts and their groups

  • Securing sensitive files and directorsie

  • Differences between traditional permissions and ACLs.

  • Symbolic notation (Reading and interpreting permission symbols).

  • Implementing least privilege for users and groups.

  • Troubleshooting Permissions Issues.

Find/Locate/Grep

FIND

  • Basic File Searching with find

  • Searching by file type (directories,regular files and Filtering)

  • Advanced File Searching with find

Locate

  • Locating Files with locate

  • Limiting search to specific directories,Filtering search results

  • Executing commands on search results

Grep

  • Searching Inside Files with grep(Searching for text patterns,searching in multiple files,searching in different files)

  • Recursive searching in directories

  • Searching system logs (finding error messages,filtering log entries)

Backup Folders and Files Using Cp,mv and Rsync

  • Copying multiple files and directories Using Cp command

  • Backing up data to external storage Using Rsync

  • Synchronizing directories (Local and remote synchronization.)

  • Handling large directory structures efficiently Using Mv Command

  • Migrating data between disks or partitions.

FSH - File System Hierarchy

  • Understanding the root directory (/):Role and significance,Root directory structure.

  • /bin and /sbin directories and differences between them

  • System Directories and their protocols(/-root and /tmp-temporary files storage )

  • Virtual filesystems for process and system information

  • Understanding differences between distributions

  • Package management and its impact on FSH

  • Understanding Links and Mount Points

  • Differences between symbolic and hard links

  • Creating and managing links

  • Mounting and unmounting filesystem

  • Differences between hard links and symbolic (soft) links.

  • Advantages and use cases of hard and symbolic links

  • Characteristics of hard links (Shared Inode Numbers,Same Physical Files etc)

  • Modifying and deleting hard-linked files

  • Finding and fixing broken symbolic links

Fdisk - Disk Manage

  • Understanding Disk Devices in Linux

  • Command-line options and arguments

  • Partitioning Disks with fdisk (Primary partitions,Extended partitions)

  • Partition Management with fdisk

  • Resizing existing partitions

  • Converting partition table types

  • persisting it in fstab

Advance Permission

  • Access Control Lists (ACLs):(Setting ACLs using setfacl,Modifying and removing ACL entries,Managing default ACLs)

  • Extended Attributes

  • Understanding of changing attributes (chattr)

  • Setting special permissions using chmod

  • understanding purpose and significance of setui,setgid and sticky bit

  • Using default permissions and umask

  • Interaction between encryption and file permissions

  • Automating permission management tasks

Sudoers

  • Location and structure of the sudoers file.

  • Granting sudo(root) access to a user.

  • Managing group-based permissions with sudo.

  • Understanding Cmnd_Alias, User_Alias, Host_Alias, and Runas_Alias

  • Restricting specific commands for users.

Umask & Path

Umask

  • Understanding umask notation (octal vs symbolic)

  • Calculating effective permissions using umask

  • Setting and Modifying Umask

  • Permanent and temporary umask changes

  • Calculating effective permissions using umask

Path

  • How PATH is used to locate executable files (Absolute and relative path)

  • Managing the PATH Variable

  • Removing directories from the PATH

  • Setting PATH for all users and individual users

  • Identifying common issues related to umask and PATH

  • Debugging problems with umask and PATH configuration

Process & Daemons

Process

  • Managing Processes using (Pid)

  • Listing processes Using ps command

  • Identifying resource usage (CPU, memory, etc.)

  • Sending signals to processes (kill command)

  • Process Management and Job Control

  • Monitoring processes (top,htop)

  • Server health check

  • monitor server cpu memory load

Daemons

Daemon Management and Configuration

  • Using systemctl to manage systemd servic

  • Troubleshooting daemon startup issues

  • Init systems and daemon management (systemd, cron)

Cron

  • Managing Cron Jobs Using (crontab) command

  • Used to run scripts

  • Syntax for specifying time intervals

  • Backing up Cron configurations

  • Troubleshooting Cron Issues

Archive & Compression

  • File Archiving with tar and zip

  • Compression with gzip and bzip2

  • Advanced Compression Techniques

  • Archive and Compression Tools Comparison

  • Compression Formats and Compatibility

  • Security implications of compression

  • Creating and extracting compressed archives for different use cases

Shell Scripting

  • Using scripts in bash shell

  • Script file permissions and execution

  • Control Structures (if -else constructs)

  • Looping constructs (for-loop,while-loop)

  • File and Directory Handling

  • String Manipulation

  • Concatenation and substrings

  • Error Handling and Debugging

  • Using pipes to connect commands

Networking

  • Configuring Network Interfaces (ifconfig,ip command)

  • Configuring network settings in linux files

  • Automating and Managing Network Connections

  • Configuring DNS servers

  • Configuring hostname resolution

  • Understanding network routing concepts

  • Configuring hostname resolution

  • Understanding NAT concepts

  • Network Monitoring and Troubleshooting

  • Troubleshooting Hostname /etc/hosts , /etc/resolv.conf

  • Gateway,Routes,Subnets,Aliasing

Ports & Protocol

  • Understanding Ports and Protocols

  • Common network protocols (TCP, UDP, ICMP, etc.)

  • Network troubleshooting and diagnostics

  • Port Scanning and Services Identification

  • Security considerations when opening ports

  • Common network services and their default ports (e.g., SSH, HTTP, FTP)

Rpm

  • Components of an RPM package

  • RPM Package Management

  • Querying RPM Packages

  • Setting up a RPM build environment

  • RPM package scripting

  • Creating RPM package repositories

  • Features and advantages of yum over traditional package

Yum

  • Features and advantages of yum over traditional package management methods

  • Installing and removing packages with yum

  • Configuring yum repositories

  • Resolving dependency issues with yum

  • Advanced yum Commands

  • Understanding yum configuration files

  • Troubleshooting with yum

  • Automating package installations and updates with yum

Lvm

  • LVM Components - (Physical Volumes (PV), Volume Groups (VG) Logical Volumes (LV)

  • Configuring Physical Volumes (PV)

  • Creating Volume Groups (VG) - (Modifying volume groups (resizing, adding/removing physical volumes)

  • LVM and Disk Management- (Moving logical volumes between volume groups, Splitting and merging volume groups)

  • Resizing Logical Volumes - (Extending LVs: lvextend, Reducing LVs: lvreduce)

  • Adding Disks with VolumeGroup

  • Lvm Remove Pv(Physical Volume),vg(Volume Group),Lv(Logical Volume).

  • User Management

  • Types of Users (System Users, Regular User, Root User and Superuser Privileges)

  • User and Group Identifiers- (UID (User ID) and GID (Group ID)

  • Adding and Deleting Users

  • Modifying User Accounts

  • Managing User PasswordM

  • Understanding Groups - (Primary and Secondary Groups)

  • Advance permissions - (SUID, SGID, STICKY BIT)

Boot Process

  • BIOS/UEFI Initialization

  • Configuration files for boot loaders

  • Kernel initialization process

  • Kernel parameters and their significance

  • Service management and dependency resolution

  • Troubleshooting GRUB configuration errors

  • Recovery options and rescue environments

  • Analyzing boot logs and diagnosing boot issues

Troubleshooting

  • Kernel Boot Problems-(Kernel Panics,Rescue mode)

  • Bootloader Issues - (GRUB Configuration)

  • Filesystem Errors and Repair - (Identifying Disk Issues Checking and Repairing Filesystems: fsck)

  • Ctrl D Maintenence Mode

Selinux

  • Understanding SELinux policies

  • SELinux Configuration

  • SELinux Troubleshooting

  • SELinux Modes - (Enforcing, Permissive, and Disabled)

  • SELinux Policies-(Targeted, Minimum, MLS (Multi-Level Security)

  • Key Components and Configuration Files.

  • Configuration in files permission

Ntp

  • Basics of time synchronization

  • NTP operation modes(Client mode,Server mode)

  • Managing NTP service

  • High Availability and Redundancy

  • Starting and Stopping NTP Service

  • Monitoring NTP Service (NTP Queries: ntpq, ntpstat)

SSH

  • Installing and Configuring SSH

  • Connecting to Remote Systems

  • SSH Key Management- (Generating SSH Keys: ssh-keygen, Copying Public Keys to Remote Systems)

  • Enhancing SSH Security - (Disabling Root Login, Configuring AllowUsers and DenyUsers)

Ansible Basic

  • Ansible Configuration

  • Running ad-hoc commands with Ansible

  • Ansible Modules

  • Variable precedence

  • Playbook Execution and Testing

  • Ansible Playbooks (10 Playbooks)

  • Working with YAML

  • Securing Ansible control node and managed nodes

  • Limiting access to Ansible control node

  • Securing sensitive data in playbooksM

  • Hosts and groups configurations

  • Inventory file for Multiple Servers

  • Creating and using roles in Ansible playbooks

  • Encrypting and decrypting files with Ansible Vault

  • Ansible Galaxy

  • Organizing playbooks using roles

  • Ansible Roles and Handlers

NFS

  • Implement Network file Sharing

  • Granting permisson to clients

  • Mounting from Linux Client

  • Mount Persistent

  • Rpc Access

FTP

  • File transfer protocol

  • Installing Vsftpd Service

  • Accessing files from client ftp-browser

  • Granting permisson to Ftp

  • Active-Passive Ftp

Last updated