Length: 8 courses
Access Length: 6 months
Price: $700/person (USD)
Bulk Pricing: 10+ Contact Us
Instant Access After Purchase
Lecture by Recorded Video
Stop and Start as Needed
Certificate of Completion
Software Lab Included?: No
Individuals and Groups
@ Your Location
This eLearning Bundle includes these Linux courses:
Also Included - 4 Courses: An Essential Career Skills Pack with 4 courses in key areas for career management and growth, including Time Management, Digital Skills, Creativity and Soft Skills.
This course is a self-paced learning solution to fit your own schedule. Certstaffix Training eLearning courses you take on your own schedule in a web browser.
Have more than 10 students needing this course? Contact Us for bulk pricing.
In this course, expert Jordan Hudgens explores the fundamentals of the Linux operating system. As well as giving an overview of Linux and touching on its history and evolution, Hudgens will tap into some key areas of Linux including the command line interface, default tools, and managing processes. Finally, he will discuss file and user management within Linux. After completing this course you will be well on your way to becoming fluent in Linux. A continuation of Linux Part 1: Overview, Tools and Users, this course, with expert Jordan Hudgens, explores system functions as well as managing files and directories. Hudgens will discuss working with background jobs and installing packages from the command line, as well as show the power of the Linux Kernel including its flexibility and how it runs the entire OS. Finally, he will walk through the shell programming language and custom scripts, finishing up with creating partitions.
Learn all about the boot process and how to build a Linux boot process from the ground up, including how to work with GRUB, systemd, and the full boot sequence. Discover the importance of quickly and efficiently adding and configuring environment variables when it comes to building out your system. Finally, explore input and output as well as the process of piping data from files and directories or to log files. Discover what it takes to manage a Linux system. Find out what a backup file consists of and how to both manually and automatically back up a system. Explore package management including YUM and RPM, and because security is a critical, discover how to implement proper security protocols. Finally, learn what options you have when it comes to file systems and discover which option is right for you. Learn how to use VIM, one of the most universal text editors on the market. Whether you're an administrator or a developer, learn how to customize VIM to best suit your needs. Discover how to manage passwords and complete security checks with the shadow password management system. Explore advanced permissions to be able to update users, set permissions on files and directories, and keep your Linux system organized.
Linux, Part 1 of 5: Overview, Tools, and Users
Linux, Part 2 of 5: System Functions, Scripts, and Partitions
Linux, Part 3 of 5: Input/Output and Variables
Linux, Part 4 of 5: Files and Security
Linux, Part 5 of 5: VIM and Permissions
The shell remains one of the most powerful tools on a computer system yet a large number of users are unaware of how much can be accomplished with it. Using a combination of simple commands, you will see how to solve complex problems in day-to-day computer usage. This video will take you through useful real-world examples to make your daily life easy when working with the shell. It shows you how to effectively use the shell to accomplish complex tasks with ease. Starting with the basics of the shell, you will learn simple commands and their usages, allowing you to perform operations on different kinds of files. We then explain text processing and web interaction, and conclude with backups, monitoring, and other sysadmin tasks. This is an an excellent guide on solving day-to-day problems using the shell and a few powerful commands together to create solutions.
SHELL SOMETHING OUT
Printing in the Terminal
Playing with Variables and Environment Variables
Function to Prepend to Environment Variables
Math with the Shell
Playing with File Description and Redirection
Arrays and Associative Arrays
Visiting Aliases
Grabbing Information about the Terminal
Getting and Setting Dates and Delays
Debugging the Script
Functions and Arguments
Reading the Output of a Sequence of Commands
Reading n Characters without Pressing the Return Key
Running a Command Until It Succeeds
Field Separators and Iterators
Comparisons and Tests
HAVE A GOOD COMMAND
Concatenating with cat
Recording and playing Back of terminal sessions
Finding files and file listing
Playing with xargs
Translating with tr
Checksum and Verification
Cryptographic Tools and Hashes
Sorting Unique and Duplicates
Temporary File Naming and Random Numbers
Splitting Files and Data
Slicing Filenames Based on Extension
Renaming and Moving Files in Bulk
Spell Checking and Dictionary Manipulation
Automating Interactive Input
Making Commands Quicker by Running Parallel Processes
FILE IN, FILE OUT
Generating Files of any Size
The Intersection and Set Difference (A-B) on Text Files
Finding and Deleting Duplicate Files
Working with File Permissions, Ownership, and the Sticky Bit
Making Files Immutable
Generating Blank Files in Bulk
Finding Symbolic Links and Their Targets
Enumerating File Type Statistics
Using Loopback Files
Finding the Difference between Files, Patching
Using Head and Tail for Printing the Last or First Ten Lines
Listing Only Directories – Alternative Methods
Fast Command-Line Navigation Using pushd and popd
Counting the Number of Lines, Words and Characters in a File
Printing the Directory Tree
TEXTING AND DRIVING
Using Regular Expressions
Searching and mining text inside a file with grep
Cutting a File Column-Wise with Cut
Using sed to Perform Text Replacement
Using awk for Advanced Text Processing
Finding Frequency of Words Used in a Given File
Compressing or Decompressing JavaScript
Merging Multiple Files as Columns
Printing the nth Word or Column in a File or Line
Printing Text between Line Numbers or Patterns
Printing Lines in the Reverse Order
Parsing E-mail Address and URLs from Text
Removing a Sentence in a File Containing a Word
Replacing a Pattern with Text in all Files in a Directory
Text Slicing and Parameter Operations
TANGLED WEB? NOT AT ALL!!
Downloading from a Web Page
Downloading a Web Page as Plain Text
Primer on cURL
Parsing Data from a Website
Image crawler and downloader
Web photo album generator
Creating a "define " Utility by Using the Web Backend
Finding Broken Links in a Website
Tracking changes to a website
Posting to a Web Page and Reading Response
THE BACKUP PLAN
Archiving with tar
Archiving with cpio
Compressing data with gzip
Archiving and Compressing with Zip
Faster Archiving with pbzip2
Creating filesystems with Compression
Backup Snapshots with rsync
Version Control-Based Backup with Git
Creating entire disk images using fsarchiver
THE OLD-BOY NETWORK
Let Us Ping!
Listing All the Machines Alive on a Network
Running Commands on a Remote Host with SSH
Transferring Files through the Network
Password-Less Auto-Login with SSH
Port Forwarding and Mounting Remote Drives
Network Traffic and Port Analysis
Creating Arbitrary Sockets
PUT ON THE MONITORS CAP
Monitoring Disk Usage
Calculating the Execution Time for a Command
Collecting Information about Logged-in Users, Boot Logs, and Boot Failures
Listing the Top ten CPU Consuming Processes in an Hour
Monitoring Command Outputs with Watch
Logging Access to Files and Directories
Logfile Management with logrotate
Logging with syslogd
Monitoring User Logins to Find Intruders
Remote Disk Usage Health Monitor
Finding Out Active User Hours on a System
Measuring and Optimizing Power Usage
Monitoring Disk Activity
Checking Disks and Filesystems for Errors
ADMINISTRATION CALLS
Gathering Information about Processes
Killing Processes and Send or Respond to Signals
Sending Messages to User Terminals
Gathering System Information
Using /proc for Gathering Information
Scheduling with cron
Writing and Reading the MySQL Database from Bash
User Administration Script
Bulk Image Resizing and Format Conversion
Taking Screenshots from the Terminal
Managing Multiple Terminals from One
The demand for Linux skills keeps growing in today's technical world. Organizations are looking for techies with excellent Linux skills to fulfill the positions of Linux server administrators. This course will help you to master the fundamental concepts of Linux server administration and will show you some amazing command line tricks.
The course starts with an introduction to Linux distributions. You will then learn how to install VirtualBox and CentOS on Windows and Mac. Next, you will become familiar with Linux fundamental concepts, such as directory structure, basic commands, shell, graphical editors, and directories. Moving along, you will grasp Linux intermediate skills and get a hands-on experience of the Linux boot process and system logging. Next, you will learn to manage disk, storage devices, and users and learn how to configure Linux network interfaces. Toward the end, you will become familiar with the concepts of advanced Linux permissions, shell scripting, and advanced command line interface.
By the end of this course, you will be well-versed with the fundamentals of the Linux operating system and be able to apply the skills in the real world.
Identify the basic and advanced Linux commands
Create, rename, move, edit, copy, and delete directories and files
Troubleshoot network connections
Manage disks, storage devices, and users with ease
Schedule and automate jobs using Cron
Decipher the most cryptic Linux permissions with ease
This book has extensive coverage of techniques that will help prevent attackers from breaching your system, by building a much more secure Linux environment. You will learn various security techniques such as SSH hardening, network service detection, setting up firewalls, encrypting file systems, protecting user accounts, authentication processes, and so on. Moving forward, you will also develop hands-on skills with advanced Linux permissions, access control, special modes, and more. Lastly, this book will also cover best practices and troubleshooting techniques to get your work done efficiently.By the end of this book, you will be confident in delivering a system that will be much harder to compromise.
RUNNING LINUX IN A VIRTUAL ENVIRONMENT
The Course Overview
The Threat Landscape and Keeping Up with Security News
Introduction to VirtualBox and Cygwin
SECURING USER ACCOUNTS
Setting Up sudo Privileges for Full Administrative Users
Setting Up sudo for Users with Only Certain Delegated Privileges
Advanced Tips and Tricks for Using sudo
Locking Down Users' Home Directories the Red Hat/CentOS and Debian/Ubuntu Way
Enforcing Strong Password Criteria
Setting and Enforcing Password and Account Expiration
Preventing Brute-Force Password Attacks
Locking User Accounts
SECURING YOUR SERVER WITH A FIREWALL
An Overview of iptables
Uncomplicated Firewall for Ubuntu Systems
firewalld for Red Hat Systems
nftables – A More Universal Type of Firewall System
ENCRYPTING AND SSH HARDENING
GNU Privacy Guard
Encrypting Partitions with Linux Unified Key Setup – LUKS
Encrypting Directories with eCryptfs
Using VeraCrypt for Cross-Platform Sharing of Encrypted Containers
Ensuring that SSH Protocol 1 Is Disabled
Creating a User’s SSH Key Set
Disabling Username/Password Logins
MASTERING DISCRETIONARY ACCESS CONTROL
Changing Ownership of Files and Directories
Setting Permissions Values
Using SUID and SGID
Protecting Sensitive Files
ACCESS CONTROL LISTS AND SHARED DIRECTORY MANAGEMENT
Creating an Access Control List
Creating an Inherited Access Control List
Removing a Specific Permission
Preventing Loss of ACLs
Creating a User Group and Adding Members to It
Setting the SGID Bit and the Sticky Bit
Accessing Files in the Shared Directory
IMPLEMENTING MANDATORY ACCESS CONTROL WITH SELINUX AND APPARMOR
How SELinux Can Benefit a Systems Administrator?
Setting Security Contexts for Files and Directories
Troubleshooting with setroubleshoot
Working with SELinux Policies
Looking at AppArmor Profiles
Working with AppArmor Command-Line Utilities
SCANNING, AUDITING, AND HARDENING
Installing and Updating ClamAV and maldet
Scanning with ClamAV and maldet
SELinux Considerations
Scanning for Rootkits with Rootkit Hunter
Controlling the auditd Daemon and Creating Audit Rule
Using ausearch and aureport
Scanning and Hardening with Lynis
It seems that there is never enough time in the day. But, since we all get the same 24 hours, why is it that some people achieve so much more with their time than others? This course will explain how to plan and prioritize tasks, so that we can make the most of the limited time we have. By using the time-management techniques in this course, you can improve your ability to function more effectively – even when time is tight and pressures are high. So, by the end of the course you will have the knowledge, skills and confidence to be an effective manager of your time.
With the rise of digital transformation and technology, having a basic digital literacy is essential for all types of jobs, regardless of the industry. To stay competitive and be successful in the workplace, enhancing your digital skills should be a top priority.
The digital economy is opening up ways for everyone to be creative. It doesn’t just mean being artistic – it’s more about ideas, solutions, alternatives, incremental improvements. Peter Quarry and Eve Ash discuss ways that mental capacity can be developed, perspectives changed, group power leveraged and making things actually happen.
Soft Skills are the traits, characteristics, habits, and skills needed to survive and thrive in the modern work world. Soft skills aren't usually taught in school, but you will learn them all here in this course. Are you someone that other people in your organization and industry like to work with, collaborate with and partner with? Are you seen as a valuable asset to any new project that comes along?
This soft skills training course will teach you how to develop the skills that can make the difference between a lackluster career that tops out at middle management versus one that lands you in the executive suite. Or to wherever you define career success. So many soft skills seem like common sense at first glance, but they are not commonly applied by most workers. This soft skills training course will give you an edge over your competitors. It will also make your job, your career and your life more rewarding and enjoyable.