Upgrading to Red Hat Enterprise Linux (RHEL) 8

Video description

2+ Hours of Video Instruction


In Upgrading to Red Hat Enterprise Linux (RHEL) 8 LiveLessons you learn about the new features in Red Hat Enterprise Linux 8, starting with software modules and new storage-related features. This course explains Cockpit, crypto-policies, and LUKS decryption, including how to authorize access to encrypted devices if they are offered on a trusted network. Through demos and whiteboard discussion, these features are explained along with nftables, the drop-in replacement for the iptables firewall solution. The course also discusses how Red Hat Enterprise Linux 8 has become an operating system that focuses on working with containers. The final three lessons dive into the management of containers with podman, and how to manage container images with buildah.

Topics include

Lesson 1: RHEL 8 Installation
Lesson 2: Working with Modules
Lesson 3: Using New Storage Features
Lesson 4: Using Cockpit
Lesson 5: Cryptographic Policies
Lesson 6: Policy-Based Decryption
Lesson 7: Using nftables
Lesson 8: Understanding Containers in RHEL 8
Lesson 9: Managing Containers and Images with podman
Lesson 10: Managing Container Images with buildah

About the Instructor

Sander van Vugt has been teaching Linux classes since 1995 and has written more than 60 books about different Linux-related topics. He is a Red Hat Certified Instructor and has deep knowledge and understanding of Red Hat Enterprise Linux, including the upcoming Red Hat Enterprise Linux 7. He has been teaching Linux since 1994, and as a Red Hat Certified Examiner he is authorized to proctor different Red Hat exams. He is also a regular speaker at major Linux conferences all over the world.

Skill Level


Learn How To

  • Use modifications to the package management, including yum modules and application streams
  • Use Stratis, VDO, Cockpit, and Crypto-policies
  • Work with LUKS encryption
  • Use nftables
  • Work with containers using podman
  • Use container images using buildah

Who Should Take This Course

Anyone interested in getting up to speed quickly on the new features of Red Hat Enterprise Linux 8.

Course Requirements

Experience with Red Hat Enterprise Linux 7

About Pearson Video Training

Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Prentice Hall, Sams, and Que. Topics include IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training athttp://www.informit.com/video.

O’Reilly Media, Pearson IT Certification, and Sander Van Vugt have no affiliation with Red Hat, Inc. The RED HAT and RHCSA trademarks are used for identification purposes only and are not intended to indicate affiliation with or approval by Red Hat, Inc.

Table of contents

  1. Introduction
    1. Upgrading to Red Hat Enterprise Linux (RHEL) 8: Introduction
  2. Lesson 1: RHEL 8 Installation
    1. Learning objectives
    2. 1.1 Installing RHEL 8
    3. 1.2 Using Subscription Manager
    4. 1.3 Using RHEL 8 without Subscription Manager
  3. Lesson 2: Working with Modules
    1. Learning objectives
    2. 2.1 Understanding Modules
    3. 2.2 Managing Modules
  4. Lesson 3: Using New Storage Features
    1. Learning objectives
    2. 3.1 Understanding Changes to Partitions and fstab
    3. 3.2 Understanding the Storage Stack
    4. 3.3 Understanding Stratis
    5. 3.4 Creating Stratis Volumes
    6. 3.5 Managing Stratis Volumes
    7. 3.6 Understanding VDO
    8. 3.7 Using VDO
  5. Lesson 4: Using Cockpit
    1. Learning objectives
    2. 4.1 Understanding RHEL Management Options
    3. 4.2 Using Cockpit
    4. 4.3 Adding Cockpit Modules
  6. Lesson 5: Cryptographic Policies
    1. Learning objectives
    2. 5.1 Understanding Cryptographic Policies
    3. 5.2 Managing Cryptographic Policies
  7. Lesson 6: Policy-Based Decryption
    1. Learning objectives
    2. 6.1 Setting up LUKS
    3. 6.2 Understanding Policy-Based Decryption
    4. 6.3 Managing Policy-Based Decryption
  8. Lesson 7: Using nftables
    1. Learning objectives
    2. 7.1 Understanding RHEL 8 Firewalling
    3. 7.2 Understanding nftables
    4. 7.3 Using nftables
  9. Lesson 8: Understanding Containers in RHEL 8
    1. Learning objectives
    2. 8.1 Understanding the Landscape
    3. 8.2 RHEL 8 Container Tools Overview
    4. 8.3 Connecting to Repositories
  10. Lesson 9: Managing Containers and Images with podman
    1. Learning objectives
    2. 9.1 Understanding podman
    3. 9.2 Starting with podman
    4. 9.3 Running Containers
    5. 9.4 Inspecting Containers
  11. Lesson 10: Managing Container Images with buildah
    1. Learning objectives
    2. 10.1 Understanding buildah
    3. 10.2 Creating an Image Using buildah Native Commands
    4. 10.3 Creating an Image Using Dockerfile
    5. 10.4 Creating an Image from a Running Container
    6. 10.5 Creating an Image from Scratch
  12. Summary
    1. Upgrading to Red Hat Enterprise Linux (RHEL) 8: Summary

Product information

  • Title: Upgrading to Red Hat Enterprise Linux (RHEL) 8
  • Author(s): Sander van Vugt
  • Release date: April 2019
  • Publisher(s): Pearson
  • ISBN: 0135657237