Please Submit Your Feedback

Your email address and contact will not be published. Required fields are marked *

Book Now
Home contact Us Sitemap
Janakpuri: 9999991236
Nirman Vihar: 9999087993
 
 
RHCE Training
RHCE Training
  • RHCE Training
  • Prerequisites
  • How we Provide
  • Objective
  • Projects and JOB
  • Topics
What is RHCE?

RHCE (RHCE - Red Hat Linux Certification Exam) is red hat certification exam. Which shows demonstrated the knowledge, skill and ability required of senior system administrator responsible for Red Hat Enterprise Linux systems. The program was launched in January 1999. There are nearly 75,000 Red Hat certified professionals spanning 162 countries.

An RHCE has also proven these RHCT competencies, and has demonstrated that he or she can configure networking services and security on servers running a Red Hat OS. RHCE proves an individual's ability to configure networking services and security on servers running a Red Hat OS. If you are experienced Linux administrator you can take pre-assessment questionnaires provided by redhat to determine if you are ready to take RHCE exam.

XPERT INFOTECH offers training on the latest Red Hat Enterprise Linux 6. RHCE is an advanced level Red Hat certification. Apart from high quality training with expert instructors, Vibrant provides in-house testing facility for the RHCE exam.

Before going through RHCE live project training candidate should have knowledge of given concepts listed below:
  • Strong Knowledge of Computer
  • Basic knowledge of unix
RHCE Training provided by Real time RHCE Developer of our company, has more than 4 years of domain experience.
  • We will provide real time project training with code explanation and implementation.
  • Our training modules are completely designed according to current IT market.
  • After completion of 75% of course, student will go through Major Project Training, Live Project Training, Interview Preparation and Recruitment process in IT Industry.
  • Student will go through the training of basic knowledge of unix as a complimentary package before starting of RHCE.
  • We offer regular, fast track and weekend training in RHCE Courses.
  • Study material is provided with the course which consist of concepts, examples and real time examples.
Download Required Software:
Benefits of Courses
  • Red Hat Linux Developer
  • Red Hat Linux Expert
  • Red Hat Certified Engineer (RHCE)
RHCE Training provided by Real time RHCE Developer of our company, has more than 4 years of domain experience.
  • We will provide real time project training with code explanation and implementation.
  • Our training modules are completely designed according to current IT market.
  • After completion of 75% of course, student will go through Major Project Training, Live Project Training, Interview Preparation and Recruitment process in IT Industry.
  • Student will go through the training of HTML, CSS and JavaScript as a complimentary package before starting of RHCE.
  • We offer regular, fast track and weekend training in RHCE course.
  • Study material is provided with the course which consist of concepts, examples and real time examples.
System Administration Overview
  • UNIX, Linux and Open Source
  • Duties of the System Administrator
  • Superusers and the Root Login
  • Sharing Superuser Privileges with Others (su and sudo Commands)
  • TCP/IP Networking Fundamentals
  • Infrastructure-as-a-Service (IaaS)
  • Online Help
Booting and Shutting Down Linux
  • Boot Sequence
  • Platform-as-a-Service (PaaS)
  • System Startup and Shutdown Scripts
  • The /etc/inittab File
  • Run Levels
  • chkconfig Command
  • Shutdown Commands
  • Handling Power Failures
Installation and Configuration
  • Planning: Hardware and Software Considerations
  • Site Planning
  • Installation Methods and Types
  • Installation Classes
  • Partitions
  • File System Overview
  • Swap Partition Considerations
  • Other Partition Considerations
  • Linux Loaders: LILO, MILO, SILO, GRUB
  • Software Package Selection
  • Adding and Configuring Peripherals
  • Printers
  • Modems
  • Graphics Controllers
  • Basic Networking Configuration
  • The Emergency Boot Disk
Managing Software and Devices
  • Identifying Software Packages
  • Using rpm to Manage Software
  • Using Debian Software Commands
  • Installing and Removing Software
  • Identifying Devices
  • Displaying Device and System Information (PCI, USB)
  • Plug and Play Devices
  • Device Configuration Tools
X Window System Administration
  • X Window System Introduction
  • Installation and Upgrading X Windows
  • Configuring XFree86
  • Utilities for Configuring X Windows
  • Configuring the Graphics Driver and Mouse
  • Selecting and Installing a Window Manager
  • Desktop Environments
  • Motif Development Kit Installation
Managing Users and Groups
  • Setting Policies
  • User File Management
  • The /etc/passwd file
  • The /etc/shadow file
  • The /etc/group file
  • Adding Users
  • Modifying User Accounts
  • Deleting User Accounts
  • Working with Groups
  • Setting User Environments
  • Global Restart Control Files
  • User Restart Control Files
  • X Windows Environment Files
The Linux File System
  • Conventional Directory Structure
  • Mounting a File System
  • The /etc/fstab File
  • Special Files (Device Files)
  • Inodes
  • Hard File Links
  • Soft File Links
  • Creating New File Systems with mkfs
  • The lost+found Directory
  • Repairing File Systems with fsck
  • The Journaling Attribute
  • File and Disk Management Tools
Linux File Security
  • File Permissions
  • Directory Permissions
  • Octal Representation
  • Changing Permissions
  • Setting Default Permissions
  • SUID Bit
  • SGID Bit
  • Setting the Sticky Bit
Working with the Linux Kernel
  • Linux Kernel Components
  • Classes of Kernels
  • Applying Kernel Update Patches
  • Kernel Configuration Options
  • The Kernel Configuration Tool
  • Recompiling the Kernel
Shell and Perl Scripting
  • Shell Script Fundamentals
  • Bourne Shell Syntax Overview
  • Shell Script Examples
  • Fundamentals of Perl
  • Using Perl for Administration
  • Perl Script Examples
Controlling Processes
  • Characteristics of Processes
  • Parent-Child Relationships
  • Examining Running Processes
  • Background Processes
  • Controlling Processes
  • Signaling Processes
  • Killing Processes
  • Automating Processes
  • cron and crontab
  • at and batch
  • System Processes (Daemons)
System Backups
  • Backup Concepts and Strategies
  • User Backups with tar and cpio
  • System Backup Options
  • The restore Command
  • Rescuing Disks
Setting Up Mail
  • Mail System Choices
  • Installing and Configuring sendmail
Troubleshooting the System
  • Common Problems and Symptoms
  • Troubleshooting Steps
  • Repairing General Boot Problems
  • Repairing LILO Problems
  • Repairing the GRUB Boot Loader
  • Memory Allocation
  • Hard Drive Problems
  • Repairing Corrupted Shared Libraries
  • System Logs
  • syslogd
  • Configuring the syslogd Daemon
Basic Networking
  • TCP/IP Fundamentals
  • Review of Internet Addressing
  • Network Services Overview
  • Commonly Available Services
  • Fundamental Network Configuration Files
  • Network Control Scripts and Daemons
  • Enabling Services Using xinetd
The Apache Web Server
  • What is Apache?
  • Configuring the Apache Web Server
  • Common Directives
  • Apache Virtual Hosting
NFS, NIS, DHCP, and DNS
  • Network File System (NFS)
  • How to Configure the NFS Server
  • Exporting NFS Shares
  • How to Configure the NFS Client
  • Purpose of NIS
  • How to Configure NIS
  • Implementing the Dynamic Host Configuration Protocol (DHCP)
  • Purpose of DNS
  • Working with DNS
  • How to Configure DNS
  • The rndc.conf File
  • Zone Files
  • Running the named Daemon
  • Networking Commands: telnet, ftp, rsh, rlogin, rcp
  • Installing and Configuring Secure Shell(ssh)
  • The Apache web server
Introduction to System Security
  • Security Overview
  • Maintaining System Security
  • Server Access
  • Common System Hacking Options
  • Physical Security
  • Network Security
  • Security Tools
  • Preventing Break-Ins
  • PAM Security Modules
  • Scanning the System
  • Maintaining File Integrity
  • Installing and Configuring tripwire
  • Security Scanning Using nessus
  • Securing Linux Using LIDS
  • Hardening the System Using Bastille
  • Using Firewalls
  • Packet Filtering with iptables
  • Masquerading with iptables
Module-1RH124 Red Hat
System Administration 1
  • Getting Started with the GNOME Graphical Desktop
  • Manage File Graphically with Nautilus
  • Get Help in a Graphical Environment
  • Configure Local Services
  • Administer Users and Groups
  • Manage Files from the Command Line
  • Secure Linux File Access
  • Administer Remote Systems
  • Configure General Services
  • Manage Physical Storage 1
  • Manage Logical Volumes
  • Manage Physical Storage 2
  • Monitor System Resources
  • Install Linux Graphically
  • Manage System Software
  • Manage Virtual Machines
  • Get Started with Bash
  • Control the Boot Process
  • Get Help in a Textual Environment
  • Deploy File Sharing Services
  • Establish Network Connectivity
  • Secure Network Services
Module-2 RH135 Red Hat
System Administration 2
  • Automated Installations of Red Hat Enterprise Linux
  • Controlling Access to Files
  • Accessing the Command Line
  • Managing SELinux
  • Intermediate Command Line Tools
  • Installing and Managing Software
  • Regular Expressions Pipelines and I/O Redirection
  • Managing Installed Services
  • Network Configuration and Troubleshooting
  • Analyzing and Storing Logs
  • Managing Simple Partitions and File systems
  • Managing Processes
  • Managing Flexible Storage with Logical Volumes
  • Tuning and Maintaining the Kernel
  • Access Network File Sharing Services
  • Troubleshooting
  • Managing User Accounts
Module-3 RH254 Red Hat
System Administration 3
  • Enhance User Security
  • Centralized and Secure Storage
  • Bash Scripting and Tools
  • SSL-encapsulated Web Services
  • File Security with GnuPG
  • Web Server Additional Configuration
  • Software Management
  • Basic SMTP Configuration
  • Network Monitoring
  • Caching-Only DNS Server
  • Route Network Traffic
  • File Sharing with NFS
  • Secure Network Traffic
  • File sharing with CIFS
  • Hardening the System Using Bastille
  • NTP Server Configuration
  • File sharing with FTP
  • File systems and Logs
  • Troubleshooting Boot Process
Download RHCE Course Contents : RHCE Training Course Contents
What We Provide
 
  Copyright © 2012. All Rights Reserved - Xperia Technologies Pvt. Ltd.

Home   Links   Privacy Policy   Terms of Use   Contact Us