Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
problems
Classroom Network
Managing ●
Internationalization
Files Getting
Help
Files Getting
Help
●
Use Bash shell synt ax to enter commands at a Linux
●
console. Launch applications in a GNOME desktop
●
environment .
Use Bash features to run commands from a shell
prompt using fewer keystrokes.
●
Managing Files
Managing Using Command-
Line Tools
Files Getting Matching File Names Using
Path Name Expansion
Help
●
Identify the purpose for import ant directories on
a Linux system.
●
Specify files using absolute and relative path
●
names. Create, copy, move, and remove files and
●
directories using command-line utilities.
Match one or more file names using shell
expansion as argument s to shell commands.
●
Use the man Linux manual
●
reader. Use the pinfo GNU
Info reader.
●
●
Use the Red Hat Package
Manager (RPM) package
documentation.
Use the redhat-support-tool
command.
Local
Users and Redirect ing Output to a
●
Groups File or Program
Permission ●
Editing Text Files from the
s Shell Prompt
Editing Text Files
Processes wit h a Graphical
Editor
●
Redirect the text output of a program to a file or to
another program.
●
Edit existing text files and create new files from t he
●
shell
prompt with a text editor.
Copy text from a graphical window to a text file using
a text editor running in the graphical environment .
Local
● Users and Groups
Users and
Groups ● Gaining Superuser
● Access
Permission
s ● Managing Local User
Account s Managing Local
Processes
Group Account s Managing
User Passwords
●
Explain the role of users and groups on a Linux
system and how they are understood by the
●
computer.
●
●
Run commands as the superuser to administer a Linux
●
system. Create, modify, lock, and delete locally defined
user account s.
Create, modify, and delete locally defined group
account s.
Lock account s manually or by set ting a password-
aging policy in the shadow password file.
●
To set Linux file system permissions on files and
interpret the security effect s of different permission
set tings.
●
Explain how the Linux file permissions model
●
works. Change the permissions and ownership
of files using command-line tools.
●
Configure a directory in which newly created files
are automatically writ able by members of the group
which owns
the directory, using special permissions and default
umask settings.
Local
Users and
●
Processes
Groups ●
Controlling
Permission
●
Jobs Killing
s Processes
Monitoring
Processes Process
Activity
●
List and interpret basic information about processes
running on the system.
●
Control processes in the shell's session using bash job
●
●
control.
Terminate and control processes using signals.
Monitor resource usage and system load due to
process activity.
●
List system daemons and net work services st arted by
systemd service and socket unit s.
●
Control system daemons and network
services using systemctl.
Services
Accessing the Remote
●
Command Line with
OpenSS
SSH
●
●
Log into a remote system using ssh to run commands
from a shell prompt .
●
Set up ssh to allow secure password-free logins by
●
using a
private authentication key file.
Customize sshd configuration to restr ict direct logins
as root or to disable password-based authentication.
OpenSS
●
Syslog Files
Reviewing systemd
H Logs ●
Journal Entr ies
●
Preserving the systemd
Journal Maint aining
Accurate Time
●
Explain fundament al concept s of computer
●
net working. Test and review current network
configuration with basic utilities.
●
Manage network settings and devices with
nmcli and Net workManager.
●
●
Modify network set tings by editing the
configuration files. Configure and test system
hostname and name resolution.
●
Use tar to create new compressed archive files and
ext ract files from existing archive files.
Copy files securely to or from a remote system
●
●
running sshd.
Securely synchronize t he content s of a local file or
directory with a remote copy.
●
Managing Software
Updates with yum
Enabling yum
●
Software
RH124-RHEL7-en-1- Copyright © Repositories
2014 Red
20140606 Hat, Inc.
Goal:
●
Identify the file system
●
hierarchy. Access the content s
●
of file systems.
●
Use hard links and symlinks to make multiple
names. Search for files on mounted file
systems.
Managing a Local
Systems Review ●
Virt ualization Host
Installing a New Virt ual
Machine
●
Install a Red Hat Enterprise Linux system as a host for
running virt ual machines.
●
Perform an interactive install of Red Hat Enterprise
Linux on a virt ual machine.
LOCALIZATI
ON
DATE & TINE KEYBOA
Arner/cas7/Vew York tiin RD
ezone English
LANGUAGE (U5)
SUPPORT
English (Ll½tea 5
tates)
SOFTWARE
SYSTEN
USER
SETTINGS
Systems Review
Review