COURSE DETAILS

Course Name: Red Hat Certified Specialist in Virtualization (RH318)

Introduction

The RHCVA certification is for system administrators whose responsibilities require them to have the skill and knowledge to deploy and manage virtual hosts in production environments using Red Hat Enterprise Virtualization. This credential assures enterprises that their virtualization solutions are administered optimally and establishes credibility for service providers.

Objectives

.

Create,deploy,manage and migrate Linux virtual machines in a large-scale environment using RedHat Enterprise Virtualization.

Course Overview

The RedHat Enterprise Virtualization (RH318) is targeted at system administrators reponsible for managing virtual machines for their organization,

The use of the RedHat Enterprise Virtualization suite.


Audience

.

System Administrators who want to gain deeper knowledge about large-scale virtualization of systems, whether those systems are Linux-based or Microsoft Windows-based.

Prerequisites

.

The RHCVA exam consists of one section lasting up to 3 hours,

.

The certification exam is performance-based, meaning that candidates must perform tasks on a live system, rather than answering questions about how one might perform those tasks,

.

RHCVA certifications have a current window for 3 calendar years after it is earned.


Topics In Red Hat Enterprise Virtualization (RH318)

Define and discuss general virtualization,kernel-based Virtual Machine(KVM), and RedHat Virtualization product concepts,

Describe the RedHat Enterprise Virtualization platform,

Redhat Enterprise Virtualization architecture.

Validating package updates,

Secure RHEV Manager with users,roles,and permissions,

Troubleshoot RHEV Manager installation and runtime issues.

Install,configure,and approve RHEV Hypervisior,

Automate RHEV Hypervisor installation and configuration,

Upgrade RHEV Hypervisor software from a RHEV Manager server,

Troubleshoot RHEV Hypervisor installation and runtime problems.

Describe essential resources in RHEV,

Create RHEV Datacenter,

Create RHEV Cluster.

List the three types of storage domains and supported underlying storage technologies,

Identify the role of the storage pool manager,

Prepare,create and populate RHEV storage domains,

List the storage integration options with RedHat Enterprise Linux Openstack Platform.

Plan for and create RHEV logical networks,

Dicuss network integration options and usage with RedHat Enterprise Linux Openstack Platform,

Install a new RHEV Virtual machine,

start,stop,edit and remove virtual machines,

install paravirtualized and guest agents.

Create,restore,and delete Virual machine snapshots,

Export and import virtual machine images,

As a result of attending this course, you should be able to create and deploy Red Hat Virtualization and virtual servers.

Describe the templating process,

seal a RHEL VM for template creation,

Create and manage RHEL pools,

Automate RHEL deployment with cloud-init.

Boot sequence of RHEL 6,

What is Grub?,

Setting a bootloader and an os boot password in RHEL6,

Disable Control-Alt-Delete Key combination in text console,

Disable users list in users login screen in graphical console,

Disaply messages while users loggin in graphical console.

What is identity Management?,

How its identity management works,

Installing identity management,

Configuring identity management server,

Adding users and groups in identity management server,

configuring identity management clients.

Define identity management server users password expiration policy,

Limit client ssh user access,

Managing sudo on identity Management client systems.

What is log?,

How to collect logs from linux system using rsyslog,

Remote rsyslogging via encrypted tcp,

segregate logs in linux systems,

What is logrorate?,

Change log file roration freqency based on expected size.

What is Audit?,

Configuring audit,

Remote logging with audit,

Analyzing audit log messages,

Writing custom audit rules as persistent and temporary,

Removing audit rules,

Implement full terminal keystroke logging.

What is iptables?,

How iptables is working,

Configuring iptables in linux system,

Writing custom rules in iptables to deny or allow specific client request,

Troubleshooting iptables issues.

Practice and demonstrate knowledge and skills learned in Red Hat Server Hardening.



Outcome

Linux system administrators should be able to recognize security vulnerabilities in linux system configurations and installed packages. Linux system administrators should be able to understand and respond to Common Vulnerabilities and Exposure (CVE) and Red Hat Security Advisory (RHSA) reports Linux system administrators should kept servers in more securely.