Linux eLearning Bundle Course

Course Details:

Length: 4 courses

Access Length: 6 months

Price: $600/person (USD)

Bulk Pricing: 10+ Contact Us

Course Features:

Instant Access After Purchase

Lecture by Recorded Video

Stop and Start as Needed

Certificate of Completion

Software Lab Included?: No

Delivery Method:

Self-Paced Online

Individuals and Groups
@ Your Location


Course Overview

This eLearning Bundle includes these four Linux courses:

  • Linux
  • Linux Shell Scripting Solutions
  • Linux System Administration
  • Mastering Linux Security and Hardening

  • How it Works

    This course is a self-paced learning solution to fit your own schedule. Certstaffix Training eLearning courses you take on your own schedule in a web browser.

    • Learn at your own pace - Start and stop as it is convenient for you. Pick up where you left off.
    • Lecture utilizing video and recorded screen shots
    • 6 month subscription length
    • Instant Access After Purchase

    Have more than 10 students needing this course? Contact Us for bulk pricing.


    Course Notes

    This is a lecture only eLearning course. If you wish to practice with hands-on activities, you must provide the software and environment.


    Course Topics

    Linux - 8:35 hours

    In this course, expert Jordan Hudgens explores the fundamentals of the Linux operating system. As well as giving an overview of Linux and touching on its history and evolution, Hudgens will tap into some key areas of Linux including the command line interface, default tools, and managing processes. Finally, he will discuss file and user management within Linux. After completing this course you will be well on your way to becoming fluent in Linux. A continuation of Linux Part 1: Overview, Tools and Users, this course, with expert Jordan Hudgens, explores system functions as well as managing files and directories. Hudgens will discuss working with background jobs and installing packages from the command line, as well as show the power of the Linux Kernel including its flexibility and how it runs the entire OS. Finally, he will walk through the shell programming language and custom scripts, finishing up with creating partitions.

    Learn all about the boot process and how to build a Linux boot process from the ground up, including how to work with GRUB, systemd, and the full boot sequence. Discover the importance of quickly and efficiently adding and configuring environment variables when it comes to building out your system. Finally, explore input and output as well as the process of piping data from files and directories or to log files. Discover what it takes to manage a Linux system. Find out what a backup file consists of and how to both manually and automatically back up a system. Explore package management including YUM and RPM, and because security is a critical, discover how to implement proper security protocols. Finally, learn what options you have when it comes to file systems and discover which option is right for you. Learn how to use VIM, one of the most universal text editors on the market. Whether you're an administrator or a developer, learn how to customize VIM to best suit your needs. Discover how to manage passwords and complete security checks with the shadow password management system. Explore advanced permissions to be able to update users, set permissions on files and directories, and keep your Linux system organized.

    Linux, Part 1 of 5: Overview, Tools, and Users
    Linux, Part 2 of 5: System Functions, Scripts, and Partitions
    Linux, Part 3 of 5: Input/Output and Variables
    Linux, Part 4 of 5: Files and Security
    Linux, Part 5 of 5: VIM and Permissions

    Linux Shell Scripting Solutions - 8:25 hours

    The shell remains one of the most powerful tools on a computer system yet a large number of users are unaware of how much can be accomplished with it. Using a combination of simple commands, you will see how to solve complex problems in day-to-day computer usage. This video will take you through useful real-world examples to make your daily life easy when working with the shell. It shows you how to effectively use the shell to accomplish complex tasks with ease. Starting with the basics of the shell, you will learn simple commands and their usages, allowing you to perform operations on different kinds of files. We then explain text processing and web interaction, and conclude with backups, monitoring, and other sysadmin tasks. This is an an excellent guide on solving day-to-day problems using the shell and a few powerful commands together to create solutions.

    Printing in the Terminal
    Playing with Variables and Environment Variables
    Function to Prepend to Environment Variables
    Math with the Shell
    Playing with File Description and Redirection
    Arrays and Associative Arrays
    Visiting Aliases
    Grabbing Information about the Terminal
    Getting and Setting Dates and Delays
    Debugging the Script
    Functions and Arguments
    Reading the Output of a Sequence of Commands
    Reading n Characters without Pressing the Return Key
    Running a Command Until It Succeeds
    Field Separators and Iterators
    Comparisons and Tests

    Concatenating with cat
    Recording and playing Back of terminal sessions
    Finding files and file listing
    Playing with xargs
    Translating with tr
    Checksum and Verification
    Cryptographic Tools and Hashes
    Sorting Unique and Duplicates
    Temporary File Naming and Random Numbers
    Splitting Files and Data
    Slicing Filenames Based on Extension
    Renaming and Moving Files in Bulk
    Spell Checking and Dictionary Manipulation
    Automating Interactive Input
    Making Commands Quicker by Running Parallel Processes

    Generating Files of any Size
    The Intersection and Set Difference (A-B) on Text Files
    Finding and Deleting Duplicate Files
    Working with File Permissions, Ownership, and the Sticky Bit
    Making Files Immutable
    Generating Blank Files in Bulk
    Finding Symbolic Links and Their Targets
    Enumerating File Type Statistics
    Using Loopback Files
    Finding the Difference between Files, Patching
    Using Head and Tail for Printing the Last or First Ten Lines
    Listing Only Directories – Alternative Methods
    Fast Command-Line Navigation Using pushd and popd
    Counting the Number of Lines, Words and Characters in a File
    Printing the Directory Tree

    Using Regular Expressions
    Searching and mining text inside a file with grep
    Cutting a File Column-Wise with Cut
    Using sed to Perform Text Replacement
    Using awk for Advanced Text Processing
    Finding Frequency of Words Used in a Given File
    Compressing or Decompressing JavaScript
    Merging Multiple Files as Columns
    Printing the nth Word or Column in a File or Line
    Printing Text between Line Numbers or Patterns
    Printing Lines in the Reverse Order
    Parsing E-mail Address and URLs from Text
    Removing a Sentence in a File Containing a Word
    Replacing a Pattern with Text in all Files in a Directory
    Text Slicing and Parameter Operations

    Downloading from a Web Page
    Downloading a Web Page as Plain Text
    Primer on cURL
    Parsing Data from a Website
    Image crawler and downloader
    Web photo album generator
    Creating a "define " Utility by Using the Web Backend
    Finding Broken Links in a Website
    Tracking changes to a website
    Posting to a Web Page and Reading Response

    Archiving with tar
    Archiving with cpio
    Compressing data with gzip
    Archiving and Compressing with Zip
    Faster Archiving with pbzip2
    Creating filesystems with Compression
    Backup Snapshots with rsync
    Version Control-Based Backup with Git
    Creating entire disk images using fsarchiver

    Let Us Ping!
    Listing All the Machines Alive on a Network
    Running Commands on a Remote Host with SSH
    Transferring Files through the Network
    Password-Less Auto-Login with SSH
    Port Forwarding and Mounting Remote Drives
    Network Traffic and Port Analysis
    Creating Arbitrary Sockets

    Monitoring Disk Usage
    Calculating the Execution Time for a Command
    Collecting Information about Logged-in Users, Boot Logs, and Boot Failures
    Listing the Top ten CPU Consuming Processes in an Hour
    Monitoring Command Outputs with Watch
    Logging Access to Files and Directories
    Logfile Management with logrotate
    Logging with syslogd
    Monitoring User Logins to Find Intruders
    Remote Disk Usage Health Monitor
    Finding Out Active User Hours on a System
    Measuring and Optimizing Power Usage
    Monitoring Disk Activity
    Checking Disks and Filesystems for Errors

    Gathering Information about Processes
    Killing Processes and Send or Respond to Signals
    Sending Messages to User Terminals
    Gathering System Information
    Using /proc for Gathering Information
    Scheduling with cron
    Writing and Reading the MySQL Database from Bash
    User Administration Script
    Bulk Image Resizing and Format Conversion
    Taking Screenshots from the Terminal
    Managing Multiple Terminals from One

    Linux System Administration - 5:53 hours

    Linux System Administration LiveLessons provides novice Linux users with more than five hours of step-by-step video training covering essential system administration responsibilities and skills with professional system administrator Ben Whaley. The content comprises nine video lessons featuring command-line examples and conceptual discussion. The video tutorials offer practical advice for real world system administration, such as encouraging the use of shell shortcuts and automation to reduce tedious manual tasks and improve administrative efficiency. What You Will Learn: How to use Vagrant and VirtualBox as a makeshift lab environment Linux's history and background Shell shortcuts and basic bash scripting The Linux startup and shutdown procedures Management of user accounts The use of sudo to control access to privileged commands Interact with processes from the command line The filesystem layout File permissions and attributes Log file management with syslog and logrotate Linux on a TCP/IP network Network debugging with tcpdump and ping Using SSH for remote management The iptables host-based firewall How to secure a Linux system.

    Lesson 1: Where to Start
    Lesson 2: The Shell
    Lesson 3: Booting and Shutting Down
    Lesson 4: Access Control, Accounts and Rootly Powers
    Lesson 5: Controlling Processes
    Lesson 6: The File System
    Lesson 7: Log Files and Syslog
    Lesson 8: TCP/IP Networking
    Lesson9: Security

    Mastering Linux Security and Hardening - 4:05 hours

    This book has extensive coverage of techniques that will help prevent attackers from breaching your system, by building a much more secure Linux environment. You will learn various security techniques such as SSH hardening, network service detection, setting up firewalls, encrypting file systems, protecting user accounts, authentication processes, and so on. Moving forward, you will also develop hands-on skills with advanced Linux permissions, access control, special modes, and more. Lastly, this book will also cover best practices and troubleshooting techniques to get your work done efficiently.By the end of this book, you will be confident in delivering a system that will be much harder to compromise.

    The Course Overview
    The Threat Landscape and Keeping Up with Security News
    Introduction to VirtualBox and Cygwin

    Setting Up sudo Privileges for Full Administrative Users
    Setting Up sudo for Users with Only Certain Delegated Privileges
    Advanced Tips and Tricks for Using sudo
    Locking Down Users' Home Directories the Red Hat/CentOS and Debian/Ubuntu Way
    Enforcing Strong Password Criteria
    Setting and Enforcing Password and Account Expiration
    Preventing Brute-Force Password Attacks
    Locking User Accounts

    An Overview of iptables
    Uncomplicated Firewall for Ubuntu Systems
    firewalld for Red Hat Systems
    nftables – A More Universal Type of Firewall System

    GNU Privacy Guard
    Encrypting Partitions with Linux Unified Key Setup – LUKS
    Encrypting Directories with eCryptfs
    Using VeraCrypt for Cross-Platform Sharing of Encrypted Containers
    Ensuring that SSH Protocol 1 Is Disabled
    Creating a User’s SSH Key Set
    Disabling Username/Password Logins

    Changing Ownership of Files and Directories
    Setting Permissions Values
    Using SUID and SGID
    Protecting Sensitive Files

    Creating an Access Control List
    Creating an Inherited Access Control List
    Removing a Specific Permission
    Preventing Loss of ACLs
    Creating a User Group and Adding Members to It
    Setting the SGID Bit and the Sticky Bit
    Accessing Files in the Shared Directory

    How SELinux Can Benefit a Systems Administrator?
    Setting Security Contexts for Files and Directories
    Troubleshooting with setroubleshoot
    Working with SELinux Policies
    Looking at AppArmor Profiles
    Working with AppArmor Command-Line Utilities

    Installing and Updating ClamAV and maldet
    Scanning with ClamAV and maldet
    SELinux Considerations
    Scanning for Rootkits with Rootkit Hunter
    Controlling the auditd Daemon and Creating Audit Rule
    Using ausearch and aureport
    Scanning and Hardening with Lynis


    Explore Linux Classes Near Me:



Start your training today!