Red Hat Certified Engineer

The Red Hat Certified Engineer exam is a performance-based evaluation of Red Hat Enterprise Linux system administration skills and knowledge. Candidates perform a number of routine system administration tasks and are evaluated on whether they have met specific objective criteria. Performance-based testing means that candidates must perform tasks similar to what they must perform on the job.

Content


  1. Network Services
    • Install the packages needed to provide the service
    • Configure SELinux to support the service
    • Use SELinux port labelling to allow services to use non-standard ports
    • Configure the service to start when the system is booted
    • Configure the service for basic operation
    • Configure host-based and user-based security for the service
  2. HTTP/HTTPS
    • Configure a virtual host
    • Configure private directories
    • Deploy a basic CGI application
    • Configure group-managed content
    • Configure TLS security
  3. DNS
    • Configure a caching-only name server
    • Troubleshoot DNS client issues
  4. NFS
    • Provide network shares to specific clients
    • Provide network shares suitable for group collaboration
    • Use Kerberos to control access to NFS network shares
  5. NTP
    • Synchronize time using other NTP peers
    • Database Services
    • Install and configure MariaDB
    • Backup and restore a database
    • Create a simple database schema
    • Perform simple SQL queries against a database
  6. SMB
    • Provide network shares to specific clients
    • Provide network shares suitable for group collaboration
  7. SMTP
    • Configure a system to forward all email to a central mail server
  8. SSH
    • Configure key-based authentication
    • Configure additional options described in documentation
  9. System configuration and management
    • Route IP traffic and create static routes
    • Use FirewallD, including Rich Rules, Zones and custom rules, to implement packet filtering and configure network address translation (NAT)
    • Use /proc/sys and sysctl to modify and set kernel runtime parameters
    • Configure a system to authenticate using Kerberos
    • Configure a systems as either an iSCSI target or initiator that persistently mounts an iSCSI target
    • Produce and deliver reports on system utilization (processor, memory, disk, and network)
    • Use shell scripting to automate system maintenance tasks
    • Configure a system to log to a remote system
    • Configure a system to accept logging from a remote system