RHCA - Red Hat Certified Architect Training mohali

RHCA – Red Hat Certified Architect

Overview

A Red Hat Certified Architect is generally a Red Hat Certified Engineer who has got Red Hat’s highest level of certification. An RHCA professional should qualify the following Red Hat Certificates of Expertise:

  • Red Hat Certificate of Expertise in Deployment and Systems Management
  • Red Hat Certificate of Expertise in Directory Services and Authentication or Red Hat Certified Virtualization Administrator
  • Red Hat Certificate of Expertise in Clustering and Storage Management
  • Red Hat Certificate of Expertise in Security: Network Services or Red Hat Certificate of Expertise in Server Hardening
  • Red Hat Certificate of Expertise in Performance Tuning

Course Content

Red Hat Enterprise Clustering and Storage Management

Clusters and storage

Get an overview of storage and cluster technologies.

Create high-availability clusters.

Review and create the architecture of Pacemaker-based high-availability clusters

Nodes and quorum

Review cluster node membership and how quorum is used to control clusters.

Fencing

Understand fencing and fencing configuration.

Resource groups

Create and configure simple resource groups to provide high-availability services to clients

Troubleshoot high-availability clusters

Identify and troubleshoot cluster problems.

Complex resource groups

Control complex resource groups by using constraints.

Two-node clusters

Identify and work around two-node clusters issues.

ISCSI initiators

Manage iSCSI initiators for access to shared storage.

Multipath Storage

Configure redundant storage access.

Logical volume manager (LVM) clusters

Manage clustered LV.

Global File System 2

Create symmetric shared file systems.

Eliminate single points of failure

Eliminate single points of failure to increase service availability.

Comprehensive review

Set up high-availability services and storage.

Red Hat Server Hardening

Track security updates

Understand how Red Hat Enterprise Linux produces updates and how to use yum to perform queries to identify what errata are available

Manage software updates

Develop a process for applying updates to systems including verifying properties of the update.

Create file systems

Allocate an advanced file system layout and use file system encryption.

Manage file systems

Adjust file system properties through security related options and file system attributes.

Manage special permissions

Work with set user ID (SUID), set group ID (SGID), and sticky (SVTX) permissions and locate files with these permissions enabled.

Manage additional file access controls

Modify default permissions applied to files and directories; work with file access control lists

Monitor for file system changes

Configure software to monitor the files on your machine for changes.

Manage user accounts

Set password-aging properties for users; audit user accounts

Manage pluggable authentication modules (PAMs)

Apply changes to PAMs to enforce different types of rules on users.

Secure console access

Adjust properties for various console services to enable or disable settings based on security

Install central authentication

Install and configure a Red Hat Identity Management server and client.

Manage central authentication

Configure Red Hat Identity Management rules to control both user access to client systems and additional privileges granted to users on those systems

Configure system logging

Configure remote logging to use transport layer encryption and manage additional logs generated by remote systems.

Configure system auditing

Enable and configure system auditing.

Control access to network services

Manage firewall rules to limit connectivity to network services.