We may earn an affiliate commission when you visit our partners.
Andrew Mallett

Being able to understand and configure networking on your Red Hat Enterprise Linux 8 is an essential skill. This course will teach you to use tools and the skills to use those tools in configuring and protecting your system on a network.

Read more

Being able to understand and configure networking on your Red Hat Enterprise Linux 8 is an essential skill. This course will teach you to use tools and the skills to use those tools in configuring and protecting your system on a network.

Connecting your system to the network is a necessary risk, but can be mitigated by protecting the system once connected. In this course, RHEL 8: Managing Networking, you’ll learn to manage networking on Linux. First, you’ll explore the ip command and configuring and reading networking data. Next, you’ll discover how to use the command line tools to add all the configuration data needed to connect a system to the internet. Finally, you’ll learn how to implement firewalls with both firewalld and nftables as well as fail2ban. When you’re finished with this course, you’ll have the skills and knowledge of internetworking Linux needed to manage RHEL systems connecting to a network and the internet while maintaining adequate security.

Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Syllabus

Course Overview
Managing the TCP/IP Stack with IP
Persisting Network Configuration
Configuring Firewalls and Understanding Fail2Ban
Read more
Configuring Firewalls Using Nftables

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Teaches essential networking configuration and protection techniques crucial for sysadmins and network engineers
Provides hands-on experience through the use of command line tools, ensuring practical application of concepts
Covers industry-standard tools like ip, firewalld, and nftables, enhancing marketability and credibility
May require prior knowledge of networking concepts, which could be a barrier for beginners

Save this course

Save RHEL 8: Managing Networking to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in RHEL 8: Managing Networking with these activities:
Review TCP/IP and networking basics
Ensure a strong understanding of foundational networking concepts before beginning coursework.
Browse courses on TCP/IP
Show steps
  • Read articles on TCP/IP protocols and network topologies.
  • Review notes or materials from previous networking courses or self-study.
Create a Linux networking lab
Build your own Linux networking lab to practice the concepts learned in the course hands-on.
Show steps
  • Install a Linux distribution that supports networking.
  • Configure network interfaces and IP addresses.
  • Set up a firewall.
  • Test network connectivity.
Follow tutorials on using 'ip' command
Become proficient in using 'ip' command for network configuration and analysis.
Show steps
  • Identify tutorials on using 'ip' command for specific tasks.
  • Follow the tutorials to practice using the 'ip' command.
Five other activities
Expand to see all activities and additional details
Show all eight activities
Network configuration simulations
Complete network configuration simulations to reinforce your understanding of the tools and techniques used in the course.
Show steps
  • Configure a network interface using the ip command.
  • Set up a firewall using firewalld.
  • Monitor network traffic using tcpdump.
Configure network settings on a virtual machine
Gain practical experience configuring network settings on a system.
Browse courses on Network Configuration
Show steps
  • Set up a virtual machine with a basic network configuration.
  • Use 'ip' command or other tools to modify network settings.
  • Test and verify the new network configuration.
Troubleshooting networking issues
Follow guided tutorials to learn how to troubleshoot common networking issues.
Show steps
  • Identify the symptoms of a networking issue.
  • Use diagnostic tools to identify the root cause of the issue.
  • Resolve the issue using appropriate techniques.
Document network configuration for a specific scenario
Enhance understanding of network configuration by documenting a specific scenario.
Browse courses on Network Documentation
Show steps
  • Identify a specific network configuration scenario.
  • Use 'ip' command or other tools to retrieve network configuration data.
  • Create a document that outlines the network configuration and its purpose.
Discuss firewall configuration strategies
Exchange knowledge and gain insights on best practices for firewall configuration.
Browse courses on Firewall Configuration
Show steps
  • Join or initiate a study group or online forum to discuss firewall configuration.
  • Share experiences and discuss different firewall configuration strategies.

Career center

Learners who complete RHEL 8: Managing Networking will develop knowledge and skills that may be useful to these careers:
Network Administrator
Network Administrators are responsible for the day-to-day management, maintenance, and support of computer networks. They play a vital role in ensuring that businesses run smoothly, as they are the ones who make sure that computers, servers, routers, and other network devices are working properly. With network security becoming a top priority for companies, Network Administrators also implement and manage security measures, such as firewalls, intrusion detection systems, and virtual private networks (VPNs). In this role, you will utilize tools and command line interfaces to manage TCP/IP, implement and maintain firewalls, and protect your system from potential threats. This course will help you transition into or advance within this field by providing you with practical hands-on experience in managing and configuring network connections and security settings.
Network Engineer
Network Engineers design, build, and maintain computer networks. They use their expertise in networking hardware and software to ensure that data is transmitted quickly, securely, and reliably. Network Engineers may work in a variety of settings, including corporate offices, government agencies, and telecommunications companies. In this role, you will be responsible for network infrastructure, ensuring devices communicate seamlessly and securely, and implementing and maintaining firewalls and other security measures. This course provides the essential knowledge and skills to help you establish a solid foundation as a Network Engineer, enabling you to excel in managing, configuring, and securing network systems.
Systems Administrator
Systems Administrators are responsible for the overall health and performance of computer systems. They install, configure, and maintain hardware and software, as well as manage user accounts and permissions. Systems Administrators may also be responsible for network security, data backup, and disaster recovery. In this role, you will be able to apply your skills to ensure that systems are configured and managed for optimal performance and security. This course provides a comprehensive understanding of network configuration and management, from basic concepts to advanced firewall implementation, helping you to become an effective Systems Administrator.
IT Manager
IT Managers are responsible for planning, implementing, and managing an organization's information technology (IT) systems. They oversee the IT budget, staff, and infrastructure, and ensure that the organization's IT systems meet the business's needs. In this role, you will be able to leverage your knowledge of network management and security to make informed decisions and ensure the smooth operation of IT systems. By understanding the principles and practices covered in this course, you can contribute to the successful management and optimization of IT resources within an organization.
Security Analyst
Security Analysts are responsible for identifying, assessing, and mitigating security risks to an organization's computer systems and networks. They work with IT staff to implement and maintain security measures, and they may also conduct security audits and investigations. Understanding network configuration and management is essential for any Security Analyst, as it allows you to understand how networks operate and how to protect them from threats. This course provides a foundation in network security and firewall implementation, helping you to effectively identify and address security vulnerabilities.
Network Consultant
Network Consultants provide advice and guidance to organizations on how to design, implement, and manage their computer networks. They may also help organizations to troubleshoot network problems and improve network performance. This course can provide you with the skills and knowledge needed to succeed as a Network Consultant, as it covers the core concepts of network management, configuration, and security. By understanding the principles and practices taught in this course, you will be well-equipped to make recommendations and provide expert advice on network-related matters.
Cloud Engineer
Cloud Engineers design, build, and manage cloud computing systems. They work with cloud providers to provision and configure cloud resources, and they may also develop and deploy cloud applications. This course may be helpful to Cloud Engineers who want to gain a deeper understanding of network management and security. By understanding the concepts and practices covered in this course, you can enhance your ability to design and manage cloud systems that are secure and performant.
DevOps Engineer
DevOps Engineers combine software development and IT operations to improve the efficiency and quality of software delivery. They work with developers to automate the software development process and with operations staff to ensure that software is deployed and managed effectively. This course may be helpful to DevOps Engineers who want to gain a deeper understanding of network management and security. By understanding the concepts and practices covered in this course, you can enhance your ability to collaborate with network engineers and ensure that software is deployed in a secure and reliable manner.
Data Center Technician
Data Center Technicians are responsible for the maintenance and operation of data centers. They ensure that servers, storage systems, and other data center equipment are running smoothly and efficiently. While this course may not be directly related to the day-to-day responsibilities of a Data Center Technician, it can provide you with valuable knowledge and skills that can be applied to data center management. By understanding the principles and practices of network management and security, you will be better equipped to support and maintain data center infrastructure.
Technical Support Analyst
Technical Support Analysts provide technical support to users of computer systems and software. They may work in a variety of settings, including help desks, call centers, and IT departments. This course may be helpful to Technical Support Analysts who want to gain a deeper understanding of network management and security. By understanding the concepts and practices covered in this course, you can enhance your ability to troubleshoot and resolve network-related issues.
Systems Analyst
Systems Analysts analyze and design computer systems to meet the needs of businesses and organizations. They may also be involved in implementing and maintaining these systems. This course may be helpful to Systems Analysts who want to gain a deeper understanding of network management and security. By understanding the concepts and practices covered in this course, you can enhance your ability to design and implement systems that are secure and reliable.
Software Engineer
Software Engineers design, develop, and maintain computer software. They may work on a variety of projects, from small applications to large enterprise systems. While this course may not be directly related to the day-to-day responsibilities of a Software Engineer, it can provide you with valuable knowledge and skills that can be applied to software development. By understanding the principles and practices of network management and security, you will be better equipped to develop software that is secure and reliable.
Web Developer
Web Developers design, develop, and maintain websites. They may work on a variety of projects, from small personal websites to large e-commerce sites. While this course may not be directly related to the day-to-day responsibilities of a Web Developer, it can provide you with valuable knowledge and skills that can be applied to web development. By understanding the principles and practices of network management and security, you will be better equipped to develop websites that are secure and reliable.
Database Administrator
Database Administrators are responsible for the management and maintenance of databases. They ensure that databases are running smoothly and efficiently, and they may also be involved in designing and implementing database systems. While this course may not be directly related to the day-to-day responsibilities of a Database Administrator, it can provide you with valuable knowledge and skills that can be applied to database management. By understanding the principles and practices of network management and security, you will be better equipped to manage and maintain databases in a secure and reliable manner.

Reading list

We've selected 14 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in RHEL 8: Managing Networking.
Comprehensive guide to network security with Linux firewalls. It covers a wide range of topics, from basic firewall concepts to advanced topics such as firewall configuration and intrusion detection. It is written by a Linux security expert and valuable resource for anyone who wants to learn more about Linux firewalls.
Comprehensive guide to firewalls and intrusion detection systems. It covers a wide range of topics, from basic firewall and intrusion detection system concepts to advanced topics such as firewall configuration and intrusion detection system analysis. It is written by a security expert and valuable resource for anyone who wants to learn more about firewalls and intrusion detection systems.
Comprehensive guide to network security assessment. It covers a wide range of topics, from basic network security assessment concepts to advanced topics such as network vulnerability assessment and penetration testing. It is written by a network security expert and valuable resource for anyone who wants to learn more about network security assessment.
This textbook provides a comprehensive introduction to computer networking. It covers a wide range of topics, from the physical layer to the application layer. It is written in a clear and concise style that makes it accessible to students with a variety of backgrounds.
Save
Field manual for red teams. It covers a wide range of topics, from basic red team concepts to advanced topics such as network exploitation and malware analysis. It is written by a red team operator and valuable resource for anyone who wants to learn more about red teaming.
Practical guide to penetration testing. It covers a wide range of topics, from basic penetration testing concepts to advanced topics such as network exploitation and malware analysis. It is written by a penetration tester and valuable resource for anyone who wants to learn more about penetration testing.
This classic text provides an in-depth look at the TCP/IP protocol suite, including detailed explanations of how networking works.
Comprehensive guide to hacking. It covers a wide range of topics, from basic hacking concepts to advanced topics such as network exploitation and malware analysis. It is written by a security researcher and valuable resource for anyone who wants to learn more about hacking.
Provides a comprehensive overview of firewalls and intrusion detection systems, including how to configure and manage them.
Provides a comprehensive overview of network security, including detailed explanations of firewalls and other security mechanisms.
Provides a comprehensive overview of TCP/IP, including detailed explanations of networking concepts and protocols.
Provides a comprehensive overview of advanced Linux networking concepts and technologies.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to RHEL 8: Managing Networking.
RHEL 8: Creating and Configuring File Systems
Most relevant
Ubuntu Linux Administration: Networking
Most relevant
RHEL 8: Using Essential Tools
Most relevant
LFCS Additional Networking Topics
Most relevant
RHEL 8: Operating Running Systems
Most relevant
RHEL 8: Deploying, Configuring and Maintaining Systems
Most relevant
Linux Network Configuration
Most relevant
Understanding and Using Essential Tools for Enterprise...
Most relevant
RHEL 8: Configuring Local Storage
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser