CompTIA Linux+: Linux System Administration
Details
Course Benefits:
Linux is the open source operating system of choice for deployment throughout the enterprise. In this course, you gain the essential knowledge and skills required to leverage the wide range of Linux graphical and command line tools. CentOS - a Linux distribution that is based on Red Hat Enterprise Linux (RHEL), as well as Ubuntu are both used for this course.
This course will help you prepare for the CompTIA Linux+ certification — a highly-valued certification for Linux administrators.
To attain CompTIA Linux+ certification, you need to pass 2 exams -- LX0-103 and LX0-104. This course will prepare you for the LX0-103 exam, while Course 522 - Linux Network Administration will prepare you for the LX0-104 exam.
ActiveLearning is an Authorized CompTIA Partner.
You will learn how to:
- Use essential command line tools
- Manage software using package managers
- Install and layout the file system using well-known standards
- Manage users and their environments
- Manage processes effectively
- Manage disks and file systems (including quotas)
This Linux training course is designed for individuals who are interested in gaining in depth knowledge of how to administer a Linux server. Extensive experience (several years) using Intel x86 computers, including a strong knowledge of hardware components and their interaction with basic operating system (OS) components are assumed.
Outline
- Characteristics of the Linux Operating System
- Linux System Architecture
- Basic terminology
- Basic terminology
- Logging in
- The /etc/passwd file
- Changing Your Password
- Logging Out
- Shutting Down the System
- Rebooting the System
- man
- apropos
- whatis
- info
- Absolute and Relative Path Names
- Displaying the Current Directory
- Changing Directories
- Listing Directory Contents
- Wildcards
- Creating Directories
- Removing Directories
- Copying Files
- Moving and Renaming Files
- Deleting Files
- Creating Symbolic Links
- Displaying Files with cat, less, head, and tail
- Creating Empty Files
- Comparing Files
- Compressing and Decompressing Files
- The File System Hierarchy
- locate
- updatedb
- find
- whereis
- What are Regular Expressions?
- Creating regular expressions
- Finding strings within files using grep
- Understanding Text Streams
- Understanding Metacharacters
- Entering multiple commands in a single line
- Entering string patterns in commands
- Redirecting output to a files
- Appending to an existing file
- Using a file as input to a commands
- Using the output of one command as input to another
- Using the output of one terminal as input to another
- GUI
- Display Servers
- Desktop Environments
- Using GNOME
- Using Nautilus File Manager
- vi Modes
- Invoking vi
- Insert Commands
- Positioning Commands
- Editing Commands
- Copying and Pasting
- Saving and Quitting
- Advanced Editing Options
- Find and Replace
- Variables
- Creating Shell Variables
- Displaying Shell Variables
- Promoting Shell Variables to Environment Variables
- Creating Environment Variables
- Displaying Environment Variables
- Deleting Variables
- The PATH Environment Variable
- The which command
- Viewing previously entered commands
- Re-executing commands
- Creating Aliases
- Displaying Aliases
- Deleting Aliases
- Customizing the Prompt
- Other Shell Options
- The Shell Initialization Files
- Login Sequence
- Administration of Default User Initialization Files
- Authentication Methods
- Users and Groups
- Displaying User and Group Information
- Displaying Group Information
- Becoming the Superuser
- Executing root Commands without Logging in as root
- Becoming a Different Users
- Changing File Ownership
- Changing a File's Group Ownership
- Learning Who is Logged In
- Specifying User Limits
- Essential files for users and groups
- Adding, deleting, and modifying user accounts
- Managing groups
- Password aging
- The /etc/skel directory
- Locking an account
- Graphical user and group administration
- Permissions
- Permission Categories
- Permission Typess
- Changing Permissions
- Understanding File System Concepts
- Understanding Linux's Device Naming Scheme
- Checking File System Integrity
- Mounting and Unmounting File Systems
- Monitoring Disk Space
- Monitoring Disk Usage
- Managing Partitions
- Creating a File System
- Viewing and Changing Disk Labels
- Other ext File System Tools
- Other xfs Tools
- Monitoring I/O Usage
- Displaying Block Storage Info
- Disk Quotas
- Limits
- Steps to enable Quotas
- Viewing Quota Usage
- Understanding Backup Concepts
- Backing up and Restoring Files using tar
- Compressing Files using gzip, bzip, and xz
- Other Tools for Backing Up
- Checking File Integrity – md5sum and sha
- Understanding Process States
- Job Control
- Keeping track of jobs
- Running a job in the foreground
- Running a job in the background
- Terminating a job
- Listing processes
- Monitoring processes
- Sending signals to processes
- Terminating processes
- Process priorities
- Running tasks at a specified time -- at
- Scheduling recurring tasks – cron
- Restricting access to task scheduling
- The boot sequence
- The init process
- Runlevels
- Changing runlevels
- Changing the default runlevel
- Log files and the rsyslogd Daemon
- Configuring rsyslogd -- rsyslog.conf
- Log Utilities
- Rotating Logs
- Viewing Logs – journalctl
- Displaying History of User Log Ins and Logouts - last
- Viewing Logs in a GUI
- Graphical Tool
- Hardware requirements
- Installing CentOS
- Installing Ubuntu
- Setting the System Date and Time
- Setting the Timzeone
- Setting the System Locale
- Setting the Keyboard Layout
- Boot Loaders
- Master Boot Record
- LILO
- GRUB
- RPMs vs DEBs
- Installing packages using RPM
- RPM options
- Removing packages using RPM
- YUM
- Installing packages using DEB
- DEB options
- Removing packages using DEB
- Aptitude
- Graphical tools for software management
- Managing Shared Libraries
ActiveLearning, Inc. is the Philippines' leading provider of Information Technology and Project Management education, where thousands of students take courses from Application Development to Project Management to Network Security, and much more. Our courses are taught by expert instructors, and learning is enhanced through a blend of in-depth lectures, workshops, and hands-on exercises.
Expert Instructors
Learn from expert instructors who practice what they teach. Our instructors are involved in constant research and development, who constantly apply the lessons they teach, and who know the same technical issues you face every day.
Superior Courseware
Our courseware go through rigorous evaluation before they are released for instruction. By constantly monitoring industry developments, we make sure that you get course materials that are up to date.
Interactivity
More than just classroom lectures, practical, hands-on exercises are carefully developed for you to immediately put in to practice what you learn. By being immersed in a classroom setting, you get to participate, inquire, and be involved - all essential in expediting the learning process. Aspects you won't find in Computer-Based-Training and self-study. ...