Table of contents
Introduction
6m 58s
Lock icon
Course Introduction | 2m 6s
Lock icon
About the Exam | 4m 52s
General Troubleshooting Methods
3h 5m 17s
Lock icon
Understand and Employ General Methods for Troubleshooting | 2m 56s
Lock icon
The Troubleshooting Mindset | 3m 42s
Lock icon
Gathering System Information: System Information | 9m 24s
Lock icon
Gathering System Information: Process Discovery | 7m 5s
Lock icon
Red Hat Documentation | 4m 31s
Lock icon
Finding Information on the CLI | 12m 10s
Lock icon
Troubleshoot a Permissions Problem By Leveraging Systems Information and DocumentationTroubleshoot a Web Server by Leveraging Systems Information and Documentation on Linux | 15m
Lock icon
Monitoring and Performance Co-Pilot Setup | 5m 18s
Lock icon
Using Performance Co-Pilot | 13m 53s
Lock icon
Use Performance Co-Pilot to Monitor SystemsUse Performance Co-Pilot to Monitor Systems | 30m
Lock icon
Logging Basics | 9m 17s
Lock icon
Remote Logging | 9m 56s
Lock icon
Troubleshooting a Remote Logging ConfigurationTroubleshoot a Remote Logging Configuration on Linux | 45m
Lock icon
General Troubleshooting Methods Review | 2m 5s
Lock icon
General Troubleshooting MethodsGeneral Troubleshooting Methods | 15m
System Startup Issues
1h 34m 6s
Lock icon
Diagnose and Troubleshoot System Startup Issues | 3m 31s
Lock icon
The Boot Process | 3m 56s
Lock icon
Identifying Boot Failures | 11m 10s
Lock icon
Regaining Root Control | 4m 20s
Lock icon
Kernel Modules | 12m 40s
Lock icon
Manage Kernel Modules and ParametersManage Kernel Modules and Parameters | 10m
Lock icon
Identifying Service Failures | 9m 20s
Lock icon
Troubleshooting Service Failures Upon BootTroubleshoot Service Failures upon Boot on Linux | 15m
Lock icon
Hardware Issues | 7m 27s
Lock icon
System Startup Issues Review | 1m 42s
Lock icon
System Startup IssuesSystem Startup Issues | 15m
File System Issues
2h 29m 40s
Lock icon
Diagnose and Troubleshoot File System Issues | 2m 20s
Lock icon
Recovering Corrupted File Systems | 13m 40s
Lock icon
Recover a Corrupted File SystemRecover a Corrupted File System on Linux | 30m
Lock icon
Troubleshooting LVM Configurations | 10m 18s
Lock icon
Troubleshoot a Broken LVM ConfigurationTroubleshoot a Broken LVM Configuration | 15m
Lock icon
Recovering Data from Encrypted File Systems | 14m 42s
Lock icon
Recover Data From an Encrypted File SystemRecover Data from an Encrypted File System on Linux | 15m
Lock icon
Troubleshooting iSCSI Issues | 17m 24s
Lock icon
Troubleshoot an iSCSI IssueTroubleshoot an iSCSI Issue | 15m
Lock icon
File System Issues Review | 1m 16s
Lock icon
File System IssuesFile System Issues | 15m
Package Management Issues
1h 42m 35s
Lock icon
Resolve Package Management Issues | 1m 6s
Lock icon
Resolving Package Dependency Issues | 7m 6s
Lock icon
Fix Package Dependency IssuesFix Package Versioning Issues on Linux | 15m
Lock icon
Recovering a Corrupted RPM Database | 8m 30s
Lock icon
Recover a Corrupted RPM DatabaseRecover a Corrupted RPM Database | 30m
Lock icon
Tracking File Changes and Restoring Files | 9m 23s
Lock icon
Restore Changed System FilesRestore Changed System Files on Linux | 15m
Lock icon
Package Management Issues Review | 1m 30s
Lock icon
Package Management IssuesPackage Management Issues | 15m
Networking Issues
1h 20m 19s
Lock icon
Troubleshoot and Fix Network Connectivity Issues | 2m 20s
Lock icon
Networking Overview | 4m 19s
Lock icon
Verifying Network Connectivity | 7m 18s
Lock icon
Fixing Connectivity Issues | 12m 47s
Lock icon
Troubleshoot Network ConnectivityTroubleshoot Network Connectivity on Linux | 15m
Lock icon
Inspecting Network Traffic | 7m 34s
Lock icon
Inspect Network TrafficInspect Network Traffic on Linux | 15m
Lock icon
Networking Issues Review | 1m 1s
Lock icon
Networking IssuesNetworking Issues | 15m
Application Issues
1h 42m 31s
Lock icon
Diagnose Application Issues | 2m 1s
Lock icon
Identifying Library Dependencies | 7m 2s
Lock icon
Troubleshooting Library Dependency IssuesTroubleshoot Library Dependency Issues on Linux | 10m
Lock icon
Identifying Memory Leaks | 6m 2s
Lock icon
Application Debugging Tools | 7m 34s
Lock icon
Use Standard Application Debugging Tools on LinuxUse Standard Application Debugging Tools on Linux | 15m
Lock icon
SELinux Issues: Context | 11m 13s
Lock icon
SELinux Issues: Troubleshooting | 12m 11s
Lock icon
Resolving SELinux IssuesResolving SELinux Issues | 15m
Lock icon
Application Issues Review | 1m 28s
Lock icon
Application IssuesApplication Issues | 15m
Authentication Issues
52m 19s
Lock icon
PAM Issues | 15m
Lock icon
Troubleshoot an Issue with the Pluggable Authentication ModuleTroubleshoot an Issue with the Pluggable Authentication Module | 15m
Lock icon
Identity Management Issues | 7m 19s
Lock icon
Authentication IssuesAuthentication Issues | 15m
Aiding Third-Party Investigations
59m 57s
Lock icon
Creating Kernel Crash Dumps | 3m 24s
Lock icon
SystemTap Modules | 11m 33s
Lock icon
Troubleshoot Kernel IssuesPrepare a Linux Server for Kernel Debugging | 30m
Lock icon
Aiding Third-Party InvestigationsAiding Third-Party Investigations | 15m
Conclusion
3h 56m 6s
Lock icon
Preparing for the Exam | 10m 6s
Lock icon
Red Hat Certified Specialist in Linux Diagnostics and Troubleshooting (EX342) ExamRed Hat Certified Specialist in Linux Diagnostics and Troubleshooting (EX342) Exam | 3h 45m
Lock icon
Conclusion and What’s Next | 1m
About the author
Elle Krout
With a background at a cloud hosting company, I started learning Linux and DevOps from the bottom up as a technical writer set out to document configuration management systems. Falling in love with Linux, DevOps and tech as a whole, I eventually took my ability to explain technical concepts to wide audiences to the training area, creating courses on Red Hat, SaltStack, HashiCorp, LXD, Docker, and more.
More Courses by Elle K.
Get access now
Sign up to get immediate access to this course plus thousands more you can watch anytime, anywhere
Cancel
Close button icon