Course Details
Course Outline
1 - Performing Basic Linux Tasks
Topic A: Identify the History and Development of LinuxTopic B: Enter Shell CommandsTopic C: Get Help Using Linux
2 - Managing Users and Groups
Topic A: Assume Superuser PrivilegesTopic B: Create, Modify, and Delete UsersTopic C: Create, Modify, and Delete GroupsTopic D: Query Users and Groups Topic E: Configure Account Profiles
3 - Managing Permissions and Ownership
Topic A: Modify File and Directory PermissionsTopic B: Modify File and Directory OwnershipTopic C: Configure Special Permissions and AttributesTopic D: Troubleshoot Permissions Issues
4 - Managing Storage
Topic A: Create PartitionsTopic B: Manage Logical VolumesTopic C: Mount File SystemsTopic D: Manage File SystemsTopic E: Navigate the Linux Directory StructureTopic F: Troubleshoot Storage Issues
5 - Managing Files and Directories
Topic A: Create and Edit Text FilesTopic B: Search for FilesTopic C: Perform Operations on Files and DirectoriesTopic D: Process Text FilesTopic E: Manipulate File Output
6 - Managing Kernel Modules
Topic A: Explore the Linux KernelTopic B: Install and Configure Kernel ModulesTopic C: Monitor Kernel Modules
7 - Managing the Linux Boot Process
Topic A: Configure Linux Boot ComponentsTopic B: Configure GRUB 2
8 - Managing System Components
Topic A: Configure Localization OptionsTopic B: Configure GUIsTopic C: Manage ServicesTopic D: Troubleshoot Process IssuesTopic E: Troubleshoot CPU and Memory Issues
9 - Managing Devices
Topic A: Identify the Types of Linux DevicesTopic B: Configure DevicesTopic C: Monitor DevicesTopic D: Troubleshoot Hardware Issues
10 - Managing Networking
Topic A: Identify TCP/IP FundamentalsTopic B: Identify Linux Server RolesTopic C: Connect to a NetworkTopic D: Configure DHCP and DNS Client ServicesTopic E: Configure Cloud and Virtualization TechnologiesTopic F: Troubleshoot Networking Issues
11 - Managing Packages and Software
Topic A: Identify Package ManagersTopic B: Manage RPM Packages with YUMTopic C: Manage Debian Packages with APTTopic D: Configure RepositoriesTopic E: Acquire SoftwareTopic F: Build Software from Source CodeTopic G: Troubleshoot Software Dependency Issues
12 - Securing Linux Systems
Topic A: Implement Cybersecurity Best PracticesTopic B: Implement Identity and Access Management MethodsTopic C: Configure SELinux or AppArmorTopic D: Configure FirewallsTopic E: Implement Logging ServicesTopic F: Back Up, Restore, and Verify Data
13 - Working with Bash Scripts
Topic A: Customize the Bash Shell EnvironmentTopic B: Identify Scripting and Programming FundamentalsTopic C: Write and Execute a Simple Bash ScriptTopic D: Incorporate Control Statements in Bash Scripts
14 - Automating Tasks
Topic A: Schedule JobsTopic B: Implement Version Control Using GitTopic C: Identify Orchestration Concepts
15 - Installing Linux
Topic A: Prepare for Linux InstallationTopic B: Perform the Installation
Actual course outline may vary depending on offering center. Contact your sales representative for more information.
Who is it For?
Target Audience
This course is designed for IT professionals whose primary job responsibility is the management of servers and other devices running the Linux operating system. A typical student in this course should have at least nine months of hands-on Linux experience and at least one and a half years of IT experience in other computing environments. The target student should wish to expand their skillset to support their career in Linux system administration and operation.
This course is also designed for students who are seeking the CompTIA Linux+ certification and who want to prepare for Exam XK0-004. The Linux+ certification can validate the student's understanding and skill in configuring, monitoring, and supporting Linux systems.
Prerequisites
Other Prerequisites
To ensure your success in this course, you should have at least foundational experience with general systems administration procedures, some hands-on exposure to one or more Linux distributions, as well as knowledge of computing hardware and basic networking and cybersecurity concepts.