RHCSA Cyber Range

Gain practical experience and develop your Linux skills through 33 hands-on labs in the RHCSA Cyber Range.

33 labs  //  10 hours of training

Free training week — 1,400+ on-demand courses and hands-on labs

RHCSA Cyber Range overview

This cyber range allows you to practice tasks covered in the Red Hat Certified System Administrator (RHCSA) exam objectives.

Basic Commands and Help
Lab
Basic Commands and Help

Basic Commands and Help

Learn basic RHEL commands and gain hands-on experience as you practice in the RHCSA Cyber Range.

Duration: 20:00

Login History and Information
Lab
Login History and Information

Login History and Information

In this lab, you will work with common commands that display information about the system's users and groups as well as other system information, including uptime and kernel information.

Duration: 11:00

Compression and Archiving
Lab
Compression and Archiving

Compression and Archiving

Explore compressing and archiving tools, such as gzip, gunzip, bzip2, bunzip2 and tar, as you practice in the RHCSA Cyber Range.

Duration: 18:00

Using vi
Lab
Using vi

Using vi

Learn about the visual editor as you practice in the RHCSA Cyber Range.

Duration: 7:00

File Path and File Types
Lab
File Path and File Types

File Path and File Types

Learn about file paths and types as you practice in the RHCSA Cyber Range.

Duration: 12:00

File and Directory Operations
Lab
File and Directory Operations

File and Directory Operations

Learn about file and directory operations as you practice in the RHCSA Cyber Range.

Duration: 19:00

Finding and Linking Files
Lab
Finding and Linking Files

Finding and Linking Files

This lab explores different options for finding files on RHEL systems, based on various criteria, such as size and permissions, and walks through the process of creating soft and hard links.

Duration: 13:00

File and Directory Permissions
Lab
File and Directory Permissions

File and Directory Permissions

This lab consists of editing permissions for files and directories and seeing how these permissions affect specific users.

Duration: 18:00

Special Permissions
Lab
Special Permissions

Special Permissions

Learn about special permissions as you practice in the RHCSA Cyber Range.

Duration: 16:00

Access Control Lists
Lab
Access Control Lists

Access Control Lists

Learn about access control lists (ACL), including file and directory ACLs, and default ACLs, as you practice in the RHCSA Cyber Range.

Duration: 15:00

Managing Users
Lab
Managing Users

Managing Users

Practice managing user accounts on RHEL systems, including creating, deleting, and setting passwords.

Duration: 24:00

Managing Groups
Lab
Managing Groups

Managing Groups

Practice creating, managing, and deleting group accounts on RHEL systems in this lab.

Duration: 13:00

Bash Shell
Lab
Bash Shell

Bash Shell

Learn about Bash Shell as you practice in the RHCSA Cyber Range.

Duration: 18:00

Regular Expressions and Metacharacters
Lab
Regular Expressions and Metacharacters

Regular Expressions and Metacharacters

Learn about regular expressions and metacharacters as you practice in the RHCSA Cyber Range.

Duration: 19:00

Working with Processes and Jobs
Lab
Working with Processes and Jobs

Working with Processes and Jobs

Practice common commands for working with processes, such as top, nice/renice, ps and kill, and manage jobs with bg and fg.

Duration: 18:00

Job Scheduling
Lab
Job Scheduling

Job Scheduling

Learn about job scheduling as you practice in the RHCSA Cyber Range.

Duration: 12:00

Managing Packages with RPM
Lab
Managing Packages with RPM

Managing Packages with RPM

Learn about managing packages with RPM as you practice in the RHCSA Cyber Range.

Duration: 22:00

Managing packages with DNF
Lab
Managing packages with DNF

Managing packages with DNF

In this lab, you will practice working with DNF, or "Dandified yum". It is the next generation of the yum package manager that automatically computes dependencies and makes it easier to maintain groups of machines. DNF is the Red Hat's new default package manager.

Duration: 13:00

Managing Application Stream Modules
Lab
Managing Application Stream Modules

Managing Application Stream Modules

In this lab, you will practice working with DNF package manager to look up and manipulate application stream (AppStream) modules.

Duration: 10:00

Understanding Linux Kernel
Lab
Understanding Linux Kernel

Understanding Linux Kernel

Learn about Linux kernel as you practice in the RHCSA Cyber Range.

Duration: 12:00

Managing Units & System Tuning
Lab
Managing Units & System Tuning

Managing Units & System Tuning

Practice working with systemd to manage units and control groups, and explore tuned, a system tuning service available in RHEL.

Duration: 33:00

System Logging
Lab
System Logging

System Logging

Learn about system logging, including syslog, as you practice in the RHCSA Cyber Range.

Duration: 17:00

Creating and Managing Partitions
Lab
Creating and Managing Partitions

Creating and Managing Partitions

Learn about creating and managing partitions as you practice in the RHCSA Cyber Range.

Duration: 25:00

Storage Optimization with VDO
Lab
Storage Optimization with VDO

Storage Optimization with VDO

Virtual Data Optimizer (VDO) is one of the newer RHEL features, which allows conserving disk space, improving data throughput, and saving on storage costs. In this lab, we will install VDO and use it to create and remove a volume.

Duration: 10:00

Working with Logical Volume Manager
Lab
Working with Logical Volume Manager

Working with Logical Volume Manager

Learn about the Logical Volume Manager (LVM) as you practice in the RHCSA Cyber Range.

Duration: 31:00

Working with Stratis Filesystems
Lab
Working with Stratis Filesystems

Working with Stratis Filesystems

RHEL 8 introduced a new simplified storage management solution called Stratis. Stratis implements the advanced features of some of the existing storage components to deliver file systems that are encapsulated within logical volumes. In this lab, you will practice working with Stratic to create, manipulate, and destroy file systems and storage pools.

Duration: 14:00

Working with XFS
Lab
Working with XFS

Working with XFS

In this lab, you will practice working with X File System (XFS), including creating, mounting, and resizing XFS file systems in VDO, LVM, and Stratis logical volumes.

Duration: 44:00

Working with Swap
Lab
Working with Swap

Working with Swap

Learn about using swap as you practice in the RHCSA Cyber Range.

Duration: 11:00

Working with Remote File Systems and AutoFS
Lab
Working with Remote File Systems and AutoFS

Working with Remote File Systems and AutoFS

Practice working with Network File System (NFS) service and learn how to automatically mount NFS shares with AutoFS.

Duration: 18:00

Network information and Chrony
Lab
Network information and Chrony

Network information and Chrony

Learn about querying network information and about chrony as you practice in the RHCSA Cyber Range.

Duration: 16:00

Using Key Based Authentication
Lab
Using Key Based Authentication

Using Key Based Authentication

Learn how to generate, distribute, and use key-based authentication for SSH.

Duration: 5:00

Managing Firewall
Lab
Managing Firewall

Managing Firewall

Learn about managing firewalls, including firewalld, as you practice in the RHCSA Cyber Range.

Duration: 21:00

Understanding and Managing SELinux
Lab
Understanding and Managing SELinux

Understanding and Managing SELinux

In this lab we'll take a look at some of the tools for interacting with SELinux.

Duration: 21:00

 

Plans & pricing

Infosec Skills Personal

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

Book a Meeting
  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Award-winning training that you can trust

IDC MarketScape Leader: U.S. IT Training

IDC MarketScape Leader: U.S. IT Training

Infosec Skills

eLearning Content

eLearning Content

Infosec Skills

Best Product - Cybersecurity Training for Infosec Professionals

Best Product - Cybersecurity Training for Infosec Professionals

Infosec Skills

Security Education & Platform

Security Education & Platform

Infosec Skills

Ranked #52 in Top 100 Global Software Sellers

Ranked #52 in Top 100 Global Software Sellers

Infosec