Red Hat System Administration II (RH134) – RHEL 9 Course Overview

Red Hat System Administration II (RH134) – RHEL 9 Course Overview

The Red Hat System Administration II (RH134) – RHEL 9 course is designed for IT professionals working to become full-time enterprise Linux system administrators. The course builds upon the foundation of command-line skills covered in the Red Hat System Administration I course (RH124) and dives deeper into RHEL administration.

Learners will enhance their Command-line productivity by mastering advanced features of the Bash shell, Writing shell scripts, and utilizing various utilities. The course covers how to schedule future tasks, tune system performance, and control file access with ACLs. Security is a key aspect, with lessons on managing SELinux security and network security, ensuring that systems are well-protected.

The course also delves into Managing basic storage, Logical volumes, and implementing advanced storage features like Stratis and VDO. Accessing network-attached storage with NFS and managing the boot process are essential skills taught in the course. Lastly, learners will be introduced to Container management to handle services in a modern infrastructure, and they will practice Installing Red Hat Enterprise Linux.

Overall, RH134 is crucial for those seeking practical knowledge in Red Hat Enterprise Linux and aiming to pass the Red Hat Certified System Administrator (RHCSA) exam.

CoursePage_session_icon

Successfully delivered 72 sessions for over 140 professionals

Purchase This Course

Fee On Request

  • Live Training (Duration : 40 Hours)
  • Per Participant
  • Guaranteed-to-Run (GTR)

Filter By:

♱ Excluding VAT/GST

Classroom Training price is on request

You can request classroom training in any city on any date by Requesting More Information

  • Live Training (Duration : 40 Hours)
  • Per Participant

♱ Excluding VAT/GST

Classroom Training price is on request

You can request classroom training in any city on any date by Requesting More Information

Request More Information

Email:  WhatsApp:

Koenig's Unique Offerings

Koenig is is awarded as Red Hat's Enterprise Partner with the Highest YoY Growth for CY-23!

Following courses are similar to Red Hat System Administration II (RH134) – RHEL 9

1. CentOS 9 Linux Administration - Level II RH134 and CentOS 8 Linux Administration - Level I cover similar topics such as system administration, networking, and security Read More

2. Linux System Administration ll Both RH134 and Linux System Administration II cover advanced Linux system administration topics with hands-on labs Read More

Course Prerequisites

To ensure a successful learning experience in the Red Hat System Administration II (RH134) – RHEL 9 course, potential learners should meet the following minimum prerequisites:


  • Basic understanding of Linux or UNIX commands and concepts.
  • Familiarity with the fundamental principles of operating systems.
  • Prior completion of Red Hat System Administration I (RH124) or equivalent experience.
  • Ability to use a text editor, such as vi or nano, for editing configuration files.
  • Understanding of file system navigation and file management from the command line.
  • Basic knowledge of network addressing and configurations, including IP addresses, subnetting, and routing concepts.
  • Some experience with managing users and groups within a Linux environment.
  • Fundamental awareness of partitioning and file systems on Linux systems.

Please note that while these prerequisites are intended to provide a foundation for the RH134 course, motivation and a willingness to learn can often compensate for a lack of experience in certain areas. With dedication and the right support, students who are new to Linux can also succeed in this course.


Target Audience for Red Hat System Administration II (RH134) – RHEL 9

Red Hat System Administration II (RH134) – RHEL 9 is an advanced course designed to enhance the skills of IT professionals in managing Red Hat Enterprise Linux environments.


  • System Administrators
  • Linux Engineers
  • DevOps Engineers
  • IT Professionals seeking RHCSA certification
  • Network Administrators
  • Technical Support Specialists
  • IT Professionals with a focus on security
  • Storage Administrators
  • Database Administrators
  • Professionals managing virtualized environments
  • Cloud Administrators
  • Professionals working with containerization technologies


Learning Objectives - What you will Learn in this Red Hat System Administration II (RH134) – RHEL 9?

Introduction to Learning Outcomes and Concepts

The Red Hat System Administration II (RH134) – RHEL 9 course equips students with advanced system administration skills, focusing on efficiency, security, and management of Red Hat Enterprise Linux systems.

Learning Objectives and Outcomes

  • Enhance command-line efficiency through the use of advanced Bash features, scripting, and Red Hat utilities.
  • Schedule tasks for future execution using cron and at, ensuring regular automation of system commands.
  • Optimize system performance by configuring tuning parameters and process scheduling priorities.
  • Implement complex permission scenarios using Access Control Lists (ACLs) for fine-grained file access control.
  • Manage and secure server environments with SELinux, maintaining system integrity and compliance.
  • Administer storage devices, partitions, file systems, and swap spaces via command-line tools.
  • Create, manage, and troubleshoot logical volumes, including file systems and swap spaces.
  • Utilize advanced storage solutions such as Stratis and VDO to efficiently manage data and optimize storage utilization.
  • Configure and maintain network-attached storage using the NFS protocol, ensuring seamless access to shared resources.
  • Control the Linux boot process, service management, and troubleshoot boot-related issues effectively.
  • Secure network services with firewall configurations and SELinux policies, enhancing the system's defense against threats.
  • Perform installations of Red Hat Enterprise Linux on various platforms, including physical servers and virtual machines.
  • Run and manage containerized services using podman, integrating lightweight virtualization into system administration tasks.

Technical Topic Explanation

Command-line productivity

Command-line productivity involves using text-based commands to interact with a computer, rather than graphical interfaces. This approach is key in environments like Red Hat System Administration (RH134), where professionals manage systems efficiently. By mastering command-line techniques, administrators automate tasks, swiftly navigate system directories, manage files, and configure settings. Command-line skills boost speed, precision, and control in system management, proving essential for those aiming to excel in technical fields such as system administration with Red Hat's RH134 course.

Writing shell scripts

Writing shell scripts involves crafting text files containing commands that a Unix or Linux shell can execute. These scripts automate repetitive tasks and manage system operations efficiently. Users write scripts in an editor, making tasks like file manipulation, program execution, and printing text simpler. Shell scripting enhances productivity and reduces the chance of human error, making it a vital skill for managing Linux systems, such as those covered in Red Hat System Administration II (RH134) where automation and system management are key focus areas.

SELinux security

SELinux (Security-Enhanced Linux) is a security feature of the Linux operating system. It provides a mechanism for supporting access control security policies, including mandatory access controls (MAC). This is done by applying policy rules that define how processes and users can access system resources and files. Essentially, SELinux acts as a gatekeeper, determining which user and system activities are allowed based on security policies. Its primary goal is to limit the potential damage of system vulnerabilities by minimizing risks and limiting the actions software processes can perform.

Network security

Network security is the practice of protecting computer networks from unauthorized access, threats, and data breaches. It involves implementing policies and technologies to secure both hardware and software systems. Effective network security manages access to the network, prevents a variety of attacks, and ensures the integrity and confidentiality of data transmitted over both private and public networks. Techniques include using firewalls, anti-virus software, intrusion detection systems, and encryption. This safeguards sensitive information and defends against cyber threats, ensuring that only authorized users have access to network resources and data.

Managing basic storage

Managing basic storage involves overseeing the physical and virtual storage resources in a computer system. This includes tasks like formatting drives, managing partitions, and ensuring data is organized for efficient access and security. It also involves setting up and maintaining file systems, checking disk space, and planning for future storage needs. Mastery of these fundamentals is essential for maintaining system performance and data integrity, critical aspects covered in training such as the "Red Hat System Administration II (RH134)" course, which prepares professionals for real-world administration of Red Hat systems.

Logical volumes

Logical volumes are part of a system that manages disk storage in a more flexible way than traditional partitions. Unlike regular disk partitions that are fixed in size, logical volumes allow you to resize disk space on the fly according to your needs. This technique is particularly useful in environments where data storage requirements change over time, providing both scalability and high availability. Logical volumes work by grouping together physical volumes (like hard drives or partitions) into a larger, virtual pool called a volume group, allowing administrators to easily allocate and manage this space.

Stratis

Stratis is a blockchain-as-a-service platform designed to facilitate the development of private blockchains for corporate use. It allows businesses to implement blockchain technology in a simplified and customizable way. Stratis runs on a native C# Stratis blockchain and offers features such as smart contracts, decentralized applications, and ICO platforms. The system aims to make blockchain adoption easier for enterprises by offering infrastructure that aligns with common programming languages and pre-existing IT environments, thereby significantly reducing the learning curve and integration costs associated with blockchain technology.

Container management

Container management involves overseeing the lifecycle of software containers, which package applications and their dependencies so they can run uniformly and consistently across any environment. Effective container management tools help in deploying, scaling, networking, and securing containers, enhancing business agility and resource efficiency. With the inclusion of tools like Kubernetes, container orchestration becomes automated, optimizing hardware use, simplifying software updates, and maintaining application reliability and availability. This technology supports sustained development and operational efficiency, making it integral for enterprises aiming to leverage the versatility and scalability of cloud environments.

Installing Red Hat Enterprise Linux

Installing Red Hat Enterprise Linux, often covered in courses like Red Hat System Administration II (RH134), involves setting up the Linux operating system on a computer or server. This process includes preparation, where you identify the right hardware and software requirements, and then proceed to download the Red Hat Enterprise Linux installation media. Next, you perform the actual installation, configuring settings such as disk partitions, network connections, and user accounts according to your needs. Finally, post-installation steps include system updates and installing additional packages or software necessary for your Red Hat system to perform optimally in its intended environment.

Target Audience for Red Hat System Administration II (RH134) – RHEL 9

Red Hat System Administration II (RH134) – RHEL 9 is an advanced course designed to enhance the skills of IT professionals in managing Red Hat Enterprise Linux environments.


  • System Administrators
  • Linux Engineers
  • DevOps Engineers
  • IT Professionals seeking RHCSA certification
  • Network Administrators
  • Technical Support Specialists
  • IT Professionals with a focus on security
  • Storage Administrators
  • Database Administrators
  • Professionals managing virtualized environments
  • Cloud Administrators
  • Professionals working with containerization technologies


Learning Objectives - What you will Learn in this Red Hat System Administration II (RH134) – RHEL 9?

Introduction to Learning Outcomes and Concepts

The Red Hat System Administration II (RH134) – RHEL 9 course equips students with advanced system administration skills, focusing on efficiency, security, and management of Red Hat Enterprise Linux systems.

Learning Objectives and Outcomes

  • Enhance command-line efficiency through the use of advanced Bash features, scripting, and Red Hat utilities.
  • Schedule tasks for future execution using cron and at, ensuring regular automation of system commands.
  • Optimize system performance by configuring tuning parameters and process scheduling priorities.
  • Implement complex permission scenarios using Access Control Lists (ACLs) for fine-grained file access control.
  • Manage and secure server environments with SELinux, maintaining system integrity and compliance.
  • Administer storage devices, partitions, file systems, and swap spaces via command-line tools.
  • Create, manage, and troubleshoot logical volumes, including file systems and swap spaces.
  • Utilize advanced storage solutions such as Stratis and VDO to efficiently manage data and optimize storage utilization.
  • Configure and maintain network-attached storage using the NFS protocol, ensuring seamless access to shared resources.
  • Control the Linux boot process, service management, and troubleshoot boot-related issues effectively.
  • Secure network services with firewall configurations and SELinux policies, enhancing the system's defense against threats.
  • Perform installations of Red Hat Enterprise Linux on various platforms, including physical servers and virtual machines.
  • Run and manage containerized services using podman, integrating lightweight virtualization into system administration tasks.
Red Hat System Administration II (RH134) – RHEL 9