Linux Training Courses

Linux Training

GNU/Linux courses


Linux Course Outlines

ID Name Duration Overview
2574 Network Security in Linux 14 hours During the course, participants will learn: What is denial of service attacks, Flooding, Sniffing, MIM? How to break from the network to the server? How to watch packets on the network (also running on switches)? Do you watch any combination of the world? How to monitor the network? How to configure a firewall? How to use encrypted connections? How to create tunnels? How to log packets? How to scan ports? How to reduce the number of unnecessary services on the server? Turn off unnecessary services Flood Ping Sniffing Sniffit Ettercap Tcpdump Network monitoring Scanning ports (nmap, nessus) LAN traffic monitor (iptraf) Monitoring changes in Ethernet network interface cards, and IP number by users (arpwatch) Dump traffic on a network (tcpdump) Logging packets Log packets from the use of mechanisms NetFilters and iptables IP Protocols Logger (ippl) Firewall (based on NetFilters and iptables) Packet path through the filters Create your own chains Proxies WWW Proxy (Squid) Cryptography SSLwrap SSH and SCP SSH Tunnelling Spoofing Obtaining information about the owner of the IP address and domain Alert the authorities of a breach of the law
2575 Network Administering in Linux 14 hours The course participant will answer the following questions: How to build a network based on TCP / IP? How to plan a TCP / IP network. What are the tools available in the system? How do I share files? How does e-mail? How to configure the hardware in Linux? Basic Information History network, TCP / IP and UUCP Networking in linux Introduction to TCP / IP protocol Network interface IP Address Address Resolution IP Routing ICMP The Internet Control Message Protocol Resolving Host Names The hardware configuration Configuring the kernel The types of network devices Installing Ethernet cards Discussion protocols PLIP, PPP, SLIP Setting up a network based on TCP / IP Determining the name (hostname) IP Address Assignment Create a subnet File management hosts and networks Configuring network Interfaceów All about ifconfig Interfaceów configuration using iproute2 package traceroute command The command netstat Managing the ARP table DNS Configuration Firewall TCP / IP Designing a firewall Netfilter and IP Tables Starting network services Super Server inetd (xinetd) versus standalone Managing access to services through tcpd File Services and Protocols Network File System (NFS) Mounts NFS shares NFS Server Configuration Electronic Mail SMTP and POP3 protocols Simple setup for postfix
2576 Administration of Linux System 21 hours How to administer the system? How to build a Linux system? The system initialization (grub, kernel, init daemons, shell) How to manage user accounts? How to create and manage devices? How to create back up? The tasks of the system administrator What is Linux? Procedures for starting and closing of the system The process of loading and starting the operating system The closure of the system Restart Single user mode The init program Init as the ancestor of all processes Configuring init - / etc / inittab Run levels Login to the system Login via terminal Login via network What exactly does the program login? Access control Starting coatings User Management What is a user account? Account types Creating a User Manipulation of the groups Changing the account properties Deleting user Temporarily disable your account Get information about accounts Memory Management What is virtual memory? Create a file / swap partition The use of swap space Sharing swap partitions with other operating systems Buffering Managing file systems Types of devices Partitions and file systems Metadata Create a partition Applying a Filesystem Checking integrity File management devices MAKEDEV script Mknod command CRON Configuring the cron service Monitoring system The term consumption of resources and activities Research what operations are performed in the given time different programs Monitoring system activity - SADC The allocation of resources Limitation of resources allocated to the individual user - The allocation of disk space - QUOTA Analysis and configuration of system logs - syslog Automatic rotation files of records - logrotate Create Backing up Situations in which we may lose data Strategies of backup copies Full backup Differential backup Incremental Backup
2441 Puppet Fundamentals 21 hours This course is intended for organisations already using Puppet or Systems Administrators looking to implement Puppet as a new solution. The course is delivered over 3 days and involves a mixture of both presentations and exercises. On completion you will be able to deploy a basic system configuration for Puppet in a Master-Client environment. About Puppet Puppet Agent & Puppet Master Reporting Resources Resource Relationships Language Constructs Language and Templates Defined Resource Types Puppet Forge Troubleshooting & Best Practices Live Management
2577 Introduction to Linux 14 hours The course answers the questions: How to perform basic operations on the system? Where to find information and how to get help? How does the power? What are the types of files in the system? How simply and quickly solve problems? A brief history of Linux Distributions and their applications Self-installation of the system Eleven ways to find help Midnight Commander file manager Action in the BASH shell Wildcards Mounting partition The types of files Link drive symbolic link User file umask Archiver tar Gzip programs Package Management Editors vi, emacs, mcedit (cooledit) Processes, priorities, memory and CPU time System privileges Users and Groups Belonging to the group, change the group
2469 Puppet Advanced 21 hours This course is intended for experienced system administrators and developers who are looking to implement Puppet Automation into complex environments. On completion you will be able to deploy a complex systems configuration for Puppet environment in a multiple Masters-Client environment. Introduction Development Environment Puppet Module Architecture Code Compression Data separation with Hiera Virtual Resources Exported Resources Reporting and Auditing Troubleshooting MCollective Scaling Puppet
287801 Docker for Developers and System Administrators 14 hours Docker is a platform for developers and sysadmins to maintain distributed applications. It consists of a runtime to run containers and a service for sharing containers. With docker the same app can run unchanged on laptops, dedicated servers and virtual servers. This course teaches the basic usage of Docker, useful both for developers and system administrators. The course includes a lot of hands on exercises and the participants will practice in their own Docker environment and build their own Docker images during the 2 days. What is Docker? Use cases Major components of Docker Docker architecture fundamentals Docker architecture Docker images Docker registry Docker containers The underlying technology Namespaces Control groups Union FS Container format Installation of Docker Installation on Ubuntu via apt-get installation of newer version of Docker Dockerizing applications The hello world example Interactive container Daemonizing programs Container usage Running a webapp in a container Investigating a container Port mapping Viewing the logs Looking at processes Stopping and restarting Removing a container Managing images Listing images Downloading images Finding images Networking of containers Port mapping details Container linking and naming Linking and environment variables Data in containers Data volumes Host directories as data volume Host file as data volume Data volume containers Backup, restore of data volumes Contributing to the ecosystem What is Docker Hub? Registering on Docker Hub Command line login Uploading to Docker Hub Private repositories Automated builds
103 Ubuntu Desktop 7 hours This course has been prepared for people who want to know how to use Ubuntu Desktop for everyday work. This course explains how to manage your files, install and configure your devices, send emails, browse internet and use the full power of GNU/Linux operating system. Linux, Distributions and Ubuntu What is Linux? What is Ubuntu? What versions of Ubuntu are available? Is Ubuntu free? Know your Environment, Gnome Configuring Appearance Visual Effects with Ubuntu Input devices settings Sound configuration Network configuration Monitoring your resources Reading Log files Installing and Removing Software Browsing staggering catalogue of applications Installing software Upgrading selected application Removing software Upgrading the system Upgrading distribution Sharing Desktop with Others Vino and other VNC clients and servers Remote control of your computer OpenOffice Editing documents with OpenOffice writer Using OpenOffice Calc Note taking through Tomboy Emails, Calendars, Contacts and Tasks Using Evolution Configuring email settings Creating calendars Using Web Calendars (Like Google Calendar, Ical, WebDav, etc...) Synchronizing your emails and calendar with mobile devices Instant messaging with Pidgin IM WebBrowsing Configuring Firefox Bookmarks and history Spell checker Add-ons and plug-ins Photos and Images Organizing your images with F-spot manager Editing pictures with Gimp Music and Video Playing DVD's Access (truly) free music store DRM and Ubuntu Running Windows Applications Using windows emulator (wine) to run your Windows applications How to run Windows inside Linux
287851 Linux Cluster and Storage Management on CentOS 6 & 7 35 hours Created Linux Administrators and developers who are interested with getting involved in Clustering or require knowledge of Clustering based on Linux system. Even beginners, who have the basic skill and knowledge on Linux, can catch up with this course just if you follow the instructor's lab and explanation in detail. This course is intended to practice enough clustering technology and to show it is very easy to understand the clustering technology on Linux system. This course will be delivered to audience with 40% lectures, 50% labs and 10% Q&A. This five-day course strongly emphasizes lab-based activities. You'll learn how to deploy and manage shared storage and server clusters that provide highly available network services to a mission-critical enterprise environment. It can be deliver on any distribution (CentOS and Ubuntu are commonly used) This course covers these kinds of topics: Chapter 01 Linux Cluster Introduction Chapter 02 Data Storage and Cluster Configuration Considerations Chapter 03 iSCSI Configuration Chapter 04 Device Mapper and Multipath Chapter 05 Linux Cluster Configuration with Conga Chapter 06 Linux Cluster Configuration with CCS Chapter 07 Fencing and Failover Domain Chapter 08 Quorum and Quorum Disk Chapter 09 Cluster Logical Volume Management Chapter 10 Global File System 2 Chapter 11 Samba Cluster Chapter 12 Apache Cluster with Conga and CCS Chapter 13 Database Cluster with MySQL Chapter 14 Linux Cluster using Pacemaker Chapter 15 Apache Cluster using Pacemaker Chapter 16 Linux Cluster using PCSD Web UI Chapter 17 Database Cluster with MariaDB
120 Ubuntu Server Overview 7 hours This course has been created for managers, system architects, existing Unix or Windows administrators or anyone who wants to know what Ubuntu Server operating system has to offer. This course in most cases answers the question WHAT Ubuntu Server can do for you, rather than HOW to do things. If you are interested in the HOW question then please have a look at our Ubuntu Server Administration training course. This course always covers the newest release of Ubuntu. Ubuntu Server Edition Ubuntu versions Available support TLS and standard edition Maintenance policy and life cycle Ubuntu and Hardware Checking compatibility with Ubuntu Available kernels and supported architectures Package Management Dpkg and apt-get Available sources Adding new sources Alternative packet management systems (RPM, Yums, etc...) and dependencies Aptitude Automatic Updates Distribution Upgrades Networking Network Configuration TCP/IP, IPv4 and IPv6 Dynamic Host Configuration Protocol (DHCP) Time Synchronisation with NTP Remote Administration OpenSSH Server eBoxNetwork Authentication OpenLDAP Server Samba and LDAP Kerberos Domain Name Service (DNS) Configuration Security User Management Console Security Firewall AppArmor Certificates Web Servers HTTPD - Apache2 Web Server PHP5 - Scripting Language Squid - Proxy Server Ruby on Rails Apache Tomcat Databases MySQL PostgreSQL Wiki Applications Moin Moin MediaWiki File Servers FTP Server Network File System (NFS) CUPS - Print Server Email Services Postfix Exim4 Dovecot Server Mailman Mail Filtering Version Control System Bazaar Subversion CVS Server Mercurial GIT Windows Networking Samba File Server Samba Print Server Securing a Samba File and Print Server Samba as a Domain Controller Samba Active Directory Integration Likewise Open Backups Shell Scripts Archive Rotation Bacula Virtualization and Cloud Computing libvirt JeOS and vmbuilder Quemu and KVM VirtualBox VMware EC2 Eucalyptus Other Keeping /etc under Version Control System Block Device Replication
287863 Top 4 Linux/Unix Servers - DNS,Web,Mail and Database 35 hours Created Linux/Unix Administrators and developers who are interested with getting involved in LInux/Unix Servers Even beginners, who have the basic skill and knowledge on Linux, can catch up with this course just if you follow the instructor's lab and explanation in detail. This course is intended to practice enough Managing Linux Servers and to show it is very easy to understand Linux/Unix servers. This course will be delivered to audience with 40% lectures, 50% labs and 10% Q&A. This five-day course strongly emphasizes lab-based activities. You'll learn how to deploy and manage Top 4 Linux Servers that provide highly useful network services to a mission-critical enterprise environment. It can be deliver on any distribution (Fedora, CentOS are commonly used) This course covers these kinds of topics: Bind as a ;DNS server Apache as a Web Server Postfix as a Mail Server MariaDB as a Database Server Through this course, you will learn from the installation to High level features of each server.
124 Linux LPI LPIC-1 Exam 101 Preparation 14 hours This course has been created for someone preparing for the LPI certification 101 Exam. It is conducted as a series of lectures intertwined with simple exercises. System Architecture Determine and configure hardware settings Boot the system Change runlevels and shutdown or reboot system Linux Installation and Package Management Design hard disk layout Install a boot manager Manage shared libraries Use Debian package management Use RPM and YUM package management GNU and Unix Commands Work on the command line Process text streams using filters Perform basic file management Use streams, pipes and redirects Create, monitor and kill processes Modify process execution priorities Search text files using regular expressions Perform basic file editing operations using vi Devices, Linux Filesystems, Filesystem Hierarchy Standard Create partitions and filesystems Maintain the integrity of filesystems Control mounting and unmounting of filesystems Manage disk quotas Manage file permissions and ownership Create and change hard and symbolic links Find system files and place files in the correct location
288122 Linux Administration Fundamentals 21 hours Learn core Linux Systems Administration skills in a workshop environment. (Ubuntu or CentOS) Who is this course for: Engineers who want to transition into Linux engineering and administration roles. Beginners who want to understand how a Linux operating system works and how to manage it. People looking to prepare for professional certifications such as the LPI level 1 or RHCSA. Description: This course is designed to teach you about the advantages of Linux-based operating systems, their role in enterprise, and how to understand and administer them. Aimed at relative beginners, we will teach you all of the skills necessary to manage a small Linux estate. Using a combination of demonstrations and practical exercises, we will guide you through the relevant commands, tools and processes you will need to know to become a successful administrator of a professional Linux environment. The skills to properly run and maintain Linux environments are in very high demand. If you have little or no experience working with Linux and wish to become a competent administrator quickly, this course will give you all of the tools you need to enter the exciting and challenging world of Linux administration. At the end of this course you will: Understand what GNU/Linux is, and its role in modern IT Be able to install a linux distribution from scratch Be able to configure users, groups, storage, and networking of a Linux-based computer Be able to confidently navigate the command line interface (CLI) on any Linux server Understand services, processes, and system resources nstall, remove, and configure software Introduction to GNU/Linux distributions Installing a Linux-based operating system Desktop Environments System management with the bash shell Common tools File and Directory Management Processes and Services Storage Configuration Package Management Basic Networking User Management Advanced bash Getting Help
169 Linux LPI LPIC-2 Exam 201 Preparation 14 hours This course has been created for someone preparing for LPI certification. It is conducted as a series of lectures intertwined with simple exercises. Linux Kernel Kernel Components Compiling a kernel Patching a kernel Customise, build and install a custom kernel and kernel modules Manage, Query kernel and kernel modules at runtime System Startup Customising system startup and boot processes System recovery Filesystem and Devices Operating the Linux filesystem Maintaining a Linux filesystem Creating and configuring filesystem options udev Device Management Advanced Storage Device Administration Configuring RAID Adjusting Storage Device Access Logical Volume Manager Networking Configuration Basic networking configuration Advanced Network Configuration and Troubleshooting Troubleshooting network issues Notify users on system-related issues System Maintenance Make and install programs from source Backup operations Domain Name Server Basic DNS server configuration Create and maintain DNS zones Securing a DNS server
173 Linux LPI LPIC-1 Exam 102 Preparation 14 hours This course has been created for someone preparing for the LPI certification 102 Exam. It is conducted as a series of lectures intertwined with simple exercises. Shells, Scripting and Data Management Customize and use the shell environment Customize or write simple scripts SQL data management User Interfaces and Desktops Install and configure X Setup a display manager Accessibility Administrative Tasks Manage user and group accounts and related system files Automate system administration tasks by scheduling jobs Localisation and internationalisation Essential System Services Maintain system time System logging Mail Transfer Agent (MTA) basics Manage printers and printing Networking Fundamentals Fundamentals of internet protocols Basic network configuration Basic network troubleshooting Configure client side DNS Security Perform security administration tasks Setup host security Securing data with encryption
174 Linux LPI LPIC-2 Exam 202 Preparation 14 hours This course has been created for someone preparing for LPI certification. It is conducted as a series of lectures intertwined with simple exercises. Web Services Implementing a web server Maintaining a web server Implementing a proxy server File Sharing SAMBA Server Configuration NFS Server Configuration E-Mail Services Using e-mail servers Managing Local E-Mail Delivery Managing Remote E-Mail Delivery System Security Configuring a router Securing FTP servers Secure shell (SSH) TCP Wrapper Security tasks Troubleshooting Identifying boot stages and troubleshooting bootloaders General troubleshooting Troubleshooting system resources Troubleshooting environment configurations
1988 Debian Administration 35 hours This is a comprehensive training course for administering Debian GNU/Linux operating system. It is always delivered on the current version of Debian. Debian Distribution What is Debian? Choosing Debian version Debian support and help Debian community Console basics The shell prompt The shell prompt under X The root account and root shell prompt (su, sudo, running programs as root under X) GUI system administration tools Virtual consoles How to leave the command prompt How to shutdown the system Recovering a sane console Additional package suggestions for the newbie An extra user account sudo configuration The filesystem Filesystem permissions Control of permissions for newly created files: umask Permissions for groups of users (group) Timestamps Links Named pipes (FIFOs) Sockets Device files Special device files procfs and sysfs Midnight Commander (MC) Customization of MC Starting MC File manager in MC Command-line tricks in MC The internal editor in MC The internal viewer in MC Auto-start features of MC FTP virtual filesystem of MC The basic Unix-like work environment The login shell Customizing bash Special key strokes The pager Setting a default text editor How to quit vim Recording the shell activities Basic Unix commands The simple shell command Command execution and environment variable "$LANG" variable "$PATH" variable "$HOME" variable Command line options Shell glob Return value of the command Typical command sequences and shell redirection Command alias Unix-like text processing Unix text tools Regular expressions Replacement expressions Global substitution with regular expressions Extracting data from text file table Script snippets for piping commands Debian package management Debian package management prerequisites Package configuration Basic precautions Life with eternal upgrades Debian archive basics Package dependencies The event flow of the package management First response to package management troubles Basic package management operations apt-get/apt-cachevs.aptitude Basic package management operations with the commandline Interactive use of aptitude Key bindings of aptitude Package views under aptitude Search method options with aptitude The aptitude regex formula Dependency resolution of aptitude Package activity logs Examples of aptitude operations Listing packages with regex matching on package names Browsing with the regex matching Purging removed packages for good Tidying auto/manual install status System wide upgrade Advanced package management operations Advanced package management operations with commandline Verification of installed package files Safeguarding for package problems Searching on the package meta data Debian package management internals Archive meta data Top level "Release" file and authenticity Archive level "Release" files Fetching of the meta data for the package The package state for APT The package state for aptitude Local copies of the fetched packages Debian package file names The dpkg command The update-alternative command The dpkg-statoverride command The dpkg-divert command Recovery from a broken system Incompatibility with old user configuration Different packages with overlapped files Fixing broken package script Rescue with the dpkg command Recovering package selection data Tips for the package management How to pick Debian packages Packages from mixed source of archives Tweaking candidate version Updates and Backports Automatic download and upgrade of packages Limiting download bandwidth for APT Emergency downgrading Who uploaded the package? The equivs package Porting a package to the stable system Proxy server for APT Small public package archive Recording and copying system configuration Converting or installing an alien binary package Extracting package without dpkg More readings for the package management The system initialization An overview of the boot strap process BIOS, boot loader, mini-Debian system The meaning of the runlevel The configuration of the runlevel The runlevel management example The default parameter for each init script The hostname The filesystem Network interface initialization Network service initialization The system message The kernel message The udev system The kernel module initialization Authentication and Security Normal Unix authentication Managing account and password information Good password Creating encrypted password PAM and NSS Configuration files accessed by the PAM and NSS The modern centralized system management "Why GNU su does not support the wheel group" Stricter password rule Other access controls sudo SELinux, Apparmor Restricting access to some server services Security of authentication Secure password over the Internet Secure Shell Extra security measures for the Internet Securing the root password Network setup The basic network infrastructure The domain name The hostname resolution The network interface name The network address range for the LAN The network device support The modern network configuration for desktop GUI network configuration tools The low level network configuration Iproute2 commands Safe low level network operations Network optimization Finding optimal MTU Setting MTU WAN TCP optimization Netfilter infrastructure Network applications The mail system Modern mail service basics The mail configuration strategy for workstation Mail transport agent (MTA) and Mail user agent (MUA) Overview of exim4 Basic MUA- Mutt Mail delivery agent (MDA) with filter maildrop configuration procmail configuration Redeliver mbox contents POP3/IMAP4 server The remote access server and utility (SSH) Basics of SSH Port forwarding for SMTP/POP3 tunneling Connecting without remote passwords Dealing with alien SSH clients Setting up ssh-agent How to shutdown the remote system on SSH Troubleshooting SSH Other network application servers Other network application clients The diagnosis of the system daemons The X Window System Setting up desktop environment The server/client relationship The X server Starting the X Window System Starting X session with gdm Customizing the X session (classic method) Customizing the X session (new method) Connecting a remote X client via SSH Secure X terminal via the Internet X applications X office applications X utility applications System tips The screen program The use scenario for screen(1) Key bindings for the screen command Data recording and presentation The log daemon Log analyzer Recording the shell activities cleanly Customized display of text data Customized display of time and date Colorized shell echo Colorized commands Recording the editor activities for complex repeats Recording the graphic image of an X application Recording changes in configuration files Data storage tips Disk partition configuration Accessing partition using UUID Filesystem configuration Filesystem creation and integrity check Optimization of filesystem by mount options Optimization of filesystem via superblock Optimization of hard disk Using SMART to predict hard disk failure Expansion of usable storage space via LVM Expansion of usable storage space by mounting another partition Expansion of usable storage space using symlink Expansion of usable storage space using aufs Data encryption tips Removable disk encryption with dm-crypt/LUKS Encrypted swap partition with dm-crypt Automatically encrypting files with eCryptfs Automatically mounting eCryptfs Monitoring, controlling, and starting program activities Timing a process The scheduling priority The ps command The top command Listing files opened by a process Tracing program activities Identification of processes using files or sockets Repeating a command with a constant interval Repeating a command looping over files Starting a program from GUI Customizing program to be started Killing a process Scheduling tasks once Scheduling tasks regularly Alt-SysRq key System maintenance tips Who is on the system? Warning everyone Hardware identification Hardware configuration System and hardware time The terminal configuration The sound infrastructure Disabling the screen saver Disabling beep sounds Memory usage System security and integrity check The kernel Kernel parameters Kernel headers Compiling the kernel and related modules Compiling the kernel source: Debian standard method Compiling the module source: Debian standard method Non-free hardware drivers Virtualized system Virtualization tools Virtualization work flow Mounting the virtual disk image file Chroot system Multiple desktop systems Data management Sharing, copying, and archiving Archive and compression tools Copy and synchronization tools Idioms for the archive Idioms for the copy Idioms for the selection of files Backup and recovery Backup utility suites An example script for the system backup A copy script for the data backup Removable storage device Sharing data via network Archive media The binary data Viewing and editing binary data Manipulating files without mounting disk Data redundancy Data file recovery and forensic analysis Splitting a large file into small files Clearing file contents Dummy files Erasing an entire hard disk Erasing unused area of an hard disk Undeleting deleted but still open files Searching all hardlinks Invisible disk space consumption Data security infrastructure Key management for GnuPG (signing and encrypting) The MD5 sum
1989 Korn Shell Programming 21 hours UNIX is a true multitasking operating system. Its portability, reliability and efficiency has helped it and various flavours of it, become widely used for a range of applications. This course is designed for those wishing to learn Korn Shell programming. The practical exercises constitute about 50% of the course time. The course is suitable for any variant of Unix and the Linux platform is used for course delivery. Who Should Attend: Programmers, system administrators and technical support staff who need to become proficient at scripting in the Unix environment. Introduction UNIX Shells Comparing Shells Scripting Shell script basics Comments Printing output Quoting Creating shell variables Predefined shell variables Environment variables Dot scripts Aliases Positional parameters Command substitution Conditional statements If statement Extended if syntax Comparison operators Looping statements While statement Until statement Iterating for loop Break and continue Mathematics Let statement Arithmetic command Arithmetic value command Counting for loop C Mathematics Variables String length Substrings Deleting leading and training strings Providing default values Shell IO File descriptors Redirecting input and output Inline documents Opening file descriptors Reading and writing file descriptors Closing and moving file descriptors Functions Function definitions POSIX functions Positional parameters Returning a value Local and reference variables Signal Handling UNIX Signals Sending signals The trap statement User Input Using getopts The select statement Applications Hiding parameters Database Queries
1990 UNIX/Linux Shell Scripting 14 hours This 2 day course gives an introduction to the writing of UNIX Shell scripts using the Korn and Bash shells and to the more advanced features of UNIX including the batch editor sed and the text file processing language awk. Although based on the Solaris version of UNIX running on a desktop PC, the principles learnt may be applied to all other versions of UNIX including Linux, AIX, HP-UX and SCO. The course takes the format of a workshop, with a mix of lecture, working examples and practical exercises. Although the content may be customised, at least 1 day is normally needed to cover the core elements. Full course notes are provided along with sample script files and free software tools for use in accessing a UNIX server. Introduction Objectives Course Schedule Course Introductions Pre-requisites Bibliography Delegate Responsibilities Course Summary Review of Basics - optional Files Directories and Processes Displaying Directories - ls Getting Help - man Displaying Files - cat, more Simple Commands Piping - using | symbol Redirection - using > symbol Redirection - using >> symbol Redirecting Input - using < symbol Redirecting Errors Using /dev/null Foreground Jobs Background Jobs - & Stopping Jobs - kill Special Files - . and .. The Command Prompt - PS1 Creating Aliases Using Aliases Command history Command Line Edit - using Arrow Keys Command Line Edit - using vi Customising the Shell The Home Directory - HOME The Working Directory - pwd Changing Directories - cd Make Directory - mkdir Remove Directory - rmdir Interactive Copy - cp -i Interactive Move - mv -i Interactive Remove - rm -i Removing Directories - rm -r Wild Cards - File Name Generation Word count - wc Finding Files - find Finding Text in Files - grep, sort, cut, uniq, tr Changing Permissions - chmod Shell Programming Creating Shell Scripts Testing the Command Creating the Script File Adding Execute Permissions Testing the Script Running the Script - time Running the Script - dot Running the Script - exec Running the Script - ksh Debugging the Script Passing Parameters The read Command Using read in Scripts Choosing the Shell Tidying The Output Suppressing Input - stty Special Characters and Variables Quotation Marks Quoted Strings - ", ' Escape Character - * Quoted Strings - ` Using $(...) System Variables - set Other Special Variables User Variables User Variables - unset Variables in Scripts Typeset Command Integer Variables Special Constructs Creating Menus Conditions - case Creating a Menu Iteration - while, until Holding the Output - sleep Holding the Output - dummy read Ending the Script Ending the Loop Hidden Option - forking a shell Trapping Interrupts - trap More on Interrupts Highlighting Text- tput Positioning the Cursor - backtab \b Korn Shell Menu Selection Conditional Testing Testing File Attributes Testing File Permissions Multiple Tests - Nested ifs Multiple Tests - elseif The NOT Condition Multiple Conditions in One Test Testing Strings Using Square Brackets Avoiding Null Input Testing Numbers More on case Displaying Variables Placing Spaces Testing Commands Iteration, Looping Computations - let Iteration - while, until Infinite Loop Iteration - for More than 9 Parameters - shift Sub-scripts and Functions Local and Global Variables Sub-scripts Export Command Exit Status Aliases Functions Useful Functions Return Status Manipulating Functions Functions in Scripts Advanced Commands Debugging - set Setting - set Merging Files - join Merging Files - paste, basename and dirname Job Control - jobs Regular Expressions Global Regular Expression Printer - grep Expression grep - egrep Fast grep - fgrep Computations - expr Computations – bc, eval Command, Argument Processing getopts Command Using Arrays Advanced Edit – vi & sed vi - Mapping Key Combinations Mapping Control Keys Using Abbreviations Editing Many Files Regular Expressions Global Insert Here document, Batch Stream Editor - sed, sed delete, -d, sed print, -p, sed suppress, -n, sed quit, -q, sed file, -f, sed Multiple Input, sed Find and Replace sed Example Text File Processing - awk The awk Programming Tool Pattern Matching Regular Expressions Comparison Patterns Compound Patterns Range Patterns Special Patterns Built-in Functions Troubleshooting awk Scripts Passing Parameters Using Contains printf Function Computations Functions substr length Action Statements Control Flow Statements Arrays Arrays with for Loops awk Examples
1991 Linux System Administration 28 hours Audience: System administrators who need to quickly learn core Enterprise Linux proficiencies System administrators, network administrators, and other IT professionals who require proficiency performing administration tasks in Linux IT professionals on the path to becoming a Linux system administrator Overview: This Linux Administrator training course is designed for IT professionals who are new to Linux and require core Administrator skills. This course will feature GUI based tools and introduce command line concepts to provide a solid foundation for someone planning to become a Linux Administrator. The objectives are that by the end of the 4 day course you will be able to perform installation, manage physical storage, establish network connectivity and perform security administration. Establish Network Connectivity Configure, manage, and test static network settings Administer Users and Groups Implement password aging and configure an LDAP client Monitor System Resources Manage CPU, memory, and disk utilization; manage system logs Manage System Software Install software and query with yum using RHN and a custom repository Deploy Network Services Deploy VNC, FTP, and web services and require key authentication with SSH Secure Filesystems and Network Services Restrict file access with ACLs and secure network services with a firewall and SELinux Manage Physical Storage Manage encrypted partitions, filesystems, and swap space Manage Logical Volumes Understand Logical Volume concepts and manage Logical Volumes, including snapshots Control the Boot Process Understand runlevels and manage GRUB Tune and Maintain the Kernel Pass parameters to the kernel and manage kernel modules Automate Installation with Kickstart Create kickstart configurations and use them to install Linux Manage Virtual Machines Deploy and manage KVM virtual machines Troubleshoot System Problems Apply a systematic approach to diagnosing and correcting system failures Research Red Hat Resources
2573 BASH Programming 14 hours The course answers questions: How does the shell works? How to write programs in a shell? The simplest script Choosing the shell (magic number #!, Sha-bang) Calling the script External and built-in commands Some special characters Comment (#) End of Line (;) An empty statement (:) Redirection of input output (>, <, >>) Redirecting output Redirection of input Stream (|) Start the process in the background (&) Variables and Parameters Destruction of variables (unset) Variable with a null value Save the result to a variable (backquotes ``) Parameters request ($ 0, $ #, $ 1, $ 2, $ 3 ...) Manual shift Quoting. Escape character (\) Regular Expressions Conditional statements The if / then The if / then / else Nesting if statements The if / elif case statement Operators Operators and, or (&&, | |) test command Completing scrypt The exit statement Use the status of completion of the program in a script ($?) Tests and Operators Operators text file Tests the file type Test file attributes Comparison operators Comparing arithmetic using the command if Integer comparison operators Comparing strings Comparing the complex (and, or) Nesting comparison operators The assignment operator Arithmetic operators Operators operations on bits (bitwise operators) Logical operators Numeric constants Loopa The loop for / in The command seq The while loop Loop until Controlling the loop (break, continue) Text Processing Command head, tail Sort, Uniq, Expand, Unexpand Cut, Paste, Join, Wc,Tr Text search (grep) Stream Editor (sed) Interactive programs Read command User select Features Sleep command If the script does not work? (debugging)

Upcoming Courses

Linux classes, Linux instructor-led , Linux training courses, Linux one on one training, Linux instructor, Linux trainer, Evening Linux courses, Evening Linux training, Weekend Linux training, Linux boot camp, Linux on-site,Weekend Linux courses, Linux coaching

Some of our clients