Linux File System Permissions
To Change the Permission Using Symbolic Mode
To Change the Permission Using Numerical Mode
To Change User Ownership and Group Ownership
What is Default Permission? and Its Use
Getting Started with Red Hat Enterprise Linux
Getting Started with Red Hat Enterprise Linux
Introduction of Linux and What is RHEL (Red Hat Enterprise Linux)?
Hardware Requirements to install RHEL 8 Linux Operating System
How to Install RHEL (Red Hat Enterprise Linux) Operating System
Accessing the Command Line
3.1 – What is BASH? and Shell Basic Options
3.2 – What is Terminal and how to use Terminal?
3.3 – How to login and logout Linux OS and Restart and Power off the System
3.4 – Basic Commands of Linux Video 1 – Use of WHOAMI, WHO, W Commands and Use of Semicolon and PIPE Symbol
3.5 – Basic Commands of Linux Video 2 – Use of DATE Command and Its Related Options
3.6 – Basic Commands of Linux Video 3 – Use of FILE Command to check File Type in Linux
3.7 – Basic Commands of Linux Video 4 – Use of CAT, HEAD, TAIL and EC Commands
3. 8 – Basic Commands of Linux Video 5 – Use of TAB, Back Slash and History Commands
Managing Files from the command Line
4.1 – What is Linux File System Hierarchy?
4.3 – Use of PWD and LS Command with Its Options
4.4 – Use OD CD Command and Its Related Options
Getting Help in Red Hat Enterprise Linux
5.1 – How to use MAN, INFO, PINFO, Whatis and Whereis Commands in Linux
Creating, Viewing, and Editing Test Files
6.1 – Use of STDIN, STDOUT and STDERR in Linux
6.2 – Use of Pipelines, Redirection, and the tee Command
6.3 – What is Vim? And Vim Modes – Insert, Command and Extended Command
6.4 – Commands Used in VIM Editor in detail
Managing Local Users and Groups
Controlling Access to Files
8.5 What is Default Permission?
8.7 – How to use CHAGE Command in Linux
Monitoring and Managing Linux Process
9.1 – How to manage process in Linux
9.2 – How to use BG, FG, and JOBS Commands
9.3 – How to use KILL, KILLALL and PKILL Commands
Controlling Services and Daemons
Configuring and Securing SSH
11.1 – How to do SSH Using Password in Linux
11.2 – How to do SSH without password in Linux
Analyzing and Storing Logs
12.2 – How to Check Logs in Linux using JOURNALCTL Command
13.3 – IPv4 Classes with its range
13.8 – How To Provide Secondary IP and Secondary DNS IP in Linux
13.3 – Troubleshooting Commands Used in Linux like PING, NETSTAT, SS and TRACEROUTE Commands
Archiving and Transferring Files
14.2 – How to Use SCP Commands in Linux
Installing and Updating Software Packages
15.3 – YUM related other Commands used in Linux
Accessing Linux File System
16.1 – Use of LOCATE Command in Linux
16.4 – MOUNT and UNMOUNT the File System Permanently Using FSTAB file (partition)
Analyzing Servers and Getting Support
17.1 – How to Enable Web Console using COCKPIT Service in Linux
SA2- Improving Command-line Productivity
18.1 – How to use GREP Commands in Linux
18.2 – What is Bash Shell Scripting? How to Write a Shell Script in to perform the tasks in Linux
18.3 – How to apply loop in Bash Shell Scripting in Linux?
18.4 – How to apply Condition in Bash Shell Scripting in Linux?
Scheduling Future Tasks
19.1 – How to use AT Command to schedule Task in Linux
19.2 – How to use CRONTAB Command to schedule task in Linux
Tuning System Performance
20.1 – How to use tuned to optimize the system performance and enable tuned profile
20.2 – How to use nice and renice to change the priority
Controlling Access to Files with ACLs
21.1 – To work with ACL (Access Control List ) in Linux
21.2 – How to apply and remove ACL on specific user in Linux
21.3 – How to apply and remove ACL on specific user in Linux
Managing SELinux Security
22.1 – What is SElinux and its use in Linux
22.2 – Types of SElinux mode and how to change mode in linux
22.3 – how to change SElinux context / level on any file and folder in Linux
22.4 – What is SElinux boolean and how to SElinux Boolean in Linux
Managing Basic Storage
23.1 – What is MBR and GPT?
23.3 – How to create partition using with parted command using GPT Scheme
23.4 – How to format a partition with file System and mount the Volume temporary and persistently
23.5 – What is SWAP partition and its use in Operating System?
Managing Logical Volumes
24.4 – How to extend a Volume Group
Implementing Advanced Storage Features
25.1 – What is stratis? and How to create file system using statisd in Linux?
25.2 -What is vdo? and How to create vdo volume using vdo in Linux?
Accessing Network-Attached Storage
26.1 – What is NFS and its uses?
26.2 – How to mount NFS share? mount- temporary and permanent and unmount NFS share
Controlling the Boot Process
27.1 – What is booting Process in RHEL8?
27.2 – How to change targets in Linux?
27.3 – How to reset root user password in Linux?
27.4 – How to boot the system in emergency mode
Managing Network Security
28.1 – What is firewall? and how to add and remove service in firewall using firewalld
28.2 – what is firewall? and how to add and remove port in firewall using firewalld
28.3 – How to manage SElinux Port labeling in Linux
Installing Red Hat Enterprise Linux
29.1 – Installation Process in Linux and way to install any Operating System
29.2 – How to install Operating System on any Virtual Machine?
SA2 – Comprehensive Review (Recall Session)
8.6 – What is Special Permission? and How to apply Special Permission?