CompTIA Linux+
Offered By: Cybrary
Course Description
Overview
Linux is a flexible, open-source, low-cost platform favored for its ease of use in virtualization and cloud-based applications. More organizations are adopting the Linux operating system into their enterprise, and thus the need for certified employees is growing.
Our self-paced online Linux+ training prepares students with the knowledge to become a CompTIA certified expert, spanning a curriculum that covers maintenance tasks, user assistance, and installation and configuration.
If you are a technician with six months (or more) experience installing, operating, and maintaining Linux systems, this course will help you to meet the certification requirements and prepare for the exam by providing you with a broad awareness of Linux operating systems. Individuals who hold this certification demonstrate critical knowledge of installation, operation, administration, and troubleshooting devices.
System administrators, junior network administrators, database administrators, and web administrators can all benefit from this certification.There is an increasing demand for skilled professionals who can help their organization transition to open-source platforms. This Linux+ certification can provide new opportunities for rising IT and cybersecurity professionals.
What Will I Learn in This CompTIA Linux+ Course?Key topics:
- System architecture
- Linux installation & package management
- GNU & Unix commands
- Filesystems, and file structures
- Shell scripting and data management
- User interfaces and desktops
- Administrative tasks
- Essential system services
- Networking fundamentals
- Containers
- Overlay networks
- Version control with Git
- Infrastructure as Code
Skills covered:
- Explain and configure the Linux boot process
- Work with kernel modules
- Manage and configure network connections
- Configure storage in Linux
- Understand cloud and virtualization concepts
- Set time, time zones, and other localization
- Handle installation, update, and removal of software
- Create, modify, and delete users and groups; understand user types
- Understand file creation, text processing, and output redirection
- Control services using systems and/or SysVInit
- Describe and explain the roles of Linux servers
- Automate job scheduling
- Detail operation of Linux devices
- Know Graphical User Interfaces, remote desktop, console redirection, and accessibility
- Manage file and directory permissions
- Work with context-based Linux permissions in SELinux and AppArmor
- Understand and configure privilege escalation
- Implement and configure access and authentication methods
- Identify and configure Linux security best practices
- Configure logging services
- Enable and configure Linux firewalls
- Backup, restore, and compress files and directories
- Resolve issues by analyzing system properties
- Optimize performance by analyzing system processes
- Troubleshoot common user, application, and hardware issues
- Create, deploy, and execute basic BASH scripts
- Perform version control processes in Git
- Understand orchestration concepts and processes
Related Jobs:
- Technical Support Specialist
- Network Engineer
- System Administrator
- Security Engineer
The main objective of the CompTIA Linux+ online training from Cybrary is to equip you with the knowledge and skills to feel comfortable operating and maintaining Linux systems. The course is also useful for certification exam prep. Cybrary's instructor-led training will cover all the topics that are on the official certification exam, so you can be prepared to earn your Linux+ certification.
What is Involved in the Linux Plus Security Training from Cybrary?This comprehensive training course will fully prepare you to work with Linux systems. Some of the key topics include:
- Administrative tasks
- Essential system services
- Filesystems and file structures
- GNU and Unix commands
- Linux installation and package management
- Networking fundamentals
- Shell scripting and data management
- System architecture
- User interfaces and desktops
The Linux+ course is divided into 27 modules, and each section offers professional training and demonstrations on essential tasks. You will learn these specific skills:
- Determining and configuring hardware settings
- Designing a hard disk layout
- Booting the Linux system and installing a boot manager
- Using Debian, RPM, and YUM package management
- Working with the Linux command line
- Processing text streams using filters
- Creating partitions and Linux filesystems
- Handling file permissions and ownership
- Configuring and troubleshooting system network settings
One of the most pressing details of any cyber security training is figuring out where and when to complete the course. Whether you currently have a full-time job or have a packed schedule full of other commitments, Cybrary makes it easy for you to continue your education. For your convenience, you can complete all of this Linux Plus certification training d online. This gives you the freedom to study at your own pace.
How Long Will it Take to Complete the Linux Plus Course?This CompTIA Linux Plus course should take about 21 hours to complete. However, you can watch the bite-sized lessons that comprise this course on your own schedule. Whether you want to go through all the modules in one weekend or tackle everything over the course of a month, you have the flexibility to review the material as it fits into your schedule and lifestyle.
Syllabus
- Linux Boot Process
- Course Overview and Instructor Introduction
- Module 1 Overview: Linux Boot Process
- Bootstrap Phase
- Boot Options
- Bootloader Phase: GRUB Bootloader
- Bootloader Phase: GRUB2 Bootloader
- Grub File Overview (Demo)
- Grub2 File Overview (Demo)
- Boot and EFI File Overview (Demo)
- Initrd and Initramfs Commands (Demo)
- Boot Commands (Demo)
- Kernel Panic
- Kernel Modules
- Module 2 Overview: Kernel Modules
- Kernel Commands
- Kernel Commands and File Locations (Demo)
- Network Configuration
- Module 3 Overview: Network Configuration
- Host Name Configuration (Demo)
- CentOS Network Connection Files
- Ubuntu Network Connection Files
- Network Connection Configuration (Demo)
- Name Resolution Files (Demo)
- Name Resolution Commands (Demo)
- Network Connection Monitoring (Demo)
- Network Connection Management Tools (Demo)
- Network Bridging Overview
- Network Routing Overview
- Network Bonding
- Network Tuning
- Storage Management
- Module 4 Overview: Storage Management
- Partitioning: Part 1 (Demo)
- Partitioning: Part 2 (Demo)
- Block Devices (Demo)
- Filesystem Types
- Disk Space Commands (Demo)
- Path Concepts (Demo)
- Device Mapper and LVM
- LVM Commands and Device Mapper
- RAID and /dev/disk/
- File System Creation (Demo)
- File System Mounting (Demo)
- Persistent Mounts (Demo)
- External File Systems
- External File System Tools (Demo)
- XFS Filesystem Tools (Demo)
- Filesystem Troubleshooting
- Cloud and Virtualization Concepts
- Module 5 Overview: Cloud and Virtualization Concepts
- VM Templates and Markup
- Initialization Tools
- Storage Types
- Virtual Network Concepts
- Hypervisor Types
- Virtualization Commands
- Localization Options
- Module 6 Overview: Localization Options
- Environment Variables and Character Sets
- Localization File Locations (Demo)
- Localization Commands (Demo)
- Software Management
- Module 7 Overview: Software Management
- Package Types
- RPM Command (Demo)
- RPM Package Managers
- DPKG Installation Tools (Demo)
- Build Tools
- Working with Libraries
- Repositories Overview
- Repositories (Demo)
- Acquisition Commands
- User and Group Management
- Module 8 Overview: User and Group Management
- User & Group Creation (Demo)
- User & Group Modification (Demo)
- User & Group Deletion (Demo)
- File Locations (Demo)
- Password Management (Discussion and Demo)
- Query Commands (Demo)
- Enabling Quotas (Demo)
- User & Group Quotas
- Bash Profiles
- Global Entries
- File and Directory Management, Processing and Redirection
- Module 9 Overview: File and Directory Management
- File Creation and Text Editing (Demo)
- File Readers (Demo)
- Redirection Part 1
- Redirection Part 2
- Text Processing (Demo)
- Advanced Text Processing Part 1
- Advanced Text Processing Part 2
- File and Directory Operations Part 1
- File and Directory Operations Part 2
- Transfer Commands (Demo)
- Location Commands (Demo)
- Link Commands (Demo)
- Service Management with Systemd and SysVinit
- Module 10 Overview: Service Management with systemd and SysVinit
- Systemd Overview
- Systemd Command (Demo)
- Systemd-analyze blame
- Systemd Unit Files
- Systemd Targets (Demo)
- SysVinit Service Management
- SysVinit chkconfig
- SysVinit runlevels
- Server Roles
- Module 11 Overview: Server Roles
- NTP Server (Demo)
- SSH Server (Demo)
- Web Servers Overview
- Apache Web Server (Demo)
- NGINX Web Server (Demo)
- Certificate Authority Servers
- Name Server (Demo)
- DHCP (Demo)
- File Server Overview
- NFS Server Installation
- Samba Server Installation (Demo)
- Authentication Server
- Proxy Server (Demo)
- Log Server (Demo)
- Container Server
- VPN Server
- Monitoring Server
- Database Server (Demo)
- Print Server
- Mail Server (Demo)
- Load Balancers
- Clustering
- Job Scheduling and Automation
- Module 12 Overview: Job Scheduling and Automation
- The cron Daemon (Demo)
- The crontab Utility (Demo)
- at daemon (Demo)
- Job Control
- Kill Command (Demo)
- Linux Devices
- Module 13 Overview: Linux Devices
- Network Devices: Bluetooth, WiFi and Network Adapters
- I/O devices: GPIO and HBA
- Output Devices
- Printer Device Overview
- Device Bus (Demo)
- procfs File System (Demo)
- sysfs File System (Demo)
- Udev and Rule Locations
- Udevadm Commands
- USB Device Bus (Demo)
- PCI Device Bus (Demo)
- Storage Device Buses Overview
- Troubleshooting with dmesg and abrt
- Linux Graphical User Interfaces
- Module 14 Overview: Linux Graphical User Interfaces
- Display Servers: X11 and Wayland
- Linux Desktop Comparison (Demo)
- Linux Remote Desktop Options
- Console Redirection
- Accessibility (Demo)
- Permissions, User Types and Privilege Escalation
- Module 15 Overview: Permissions, User Types, and Privilege Escalation
- File and Directory Permissions
- Permission Bits
- Permissions Utilities (Demo)
- umask and Permissions
- Access Control List (Demo)
- Settling Limits with ulimit
- SELinux Overview
- SELinux Policy (Demo)
- SELinux Tools
- AppArmor Overview
- User Types (Demo)
- Privilege Escalation
- Access and Authentication
- Module 16 Overview: Access and Authentication
- PAM and Configuration File (Demo)
- PAM Utilities and Policy
- SSH Client
- SSH, Keys, and Utilities
- TCP Wrappers
- TTY and PTY Terminals
- Public Key Infrastructure (PKI)
- VPN as a Client
- Linux Security Best Practices
- Module 17 Overview: Linux Security Best Practices
- Boot Security (Discussion and Demo)
- Multifactor Authentication Methods: Tokens, OTP and Biometrics
- Remote Authentication Options
- LDAP Security Overview
- Kerberos Security
- Disabling Root Login via SSH (Demo)
- Password-Less Login and Enforcing Use of PKI (Demo)
- Chroot Jail Services
- Enforcing No Shared IDs
- Denying Hosts
- Disk Partitioning: Separate OS and Application Data
- Changing Default Ports (Demo)
- Disable or Uninstall Unused/Non-Secure Services
- Enabling SSL/TLS
- Enabling Auditd
- CVE Monitoring (Demo)
- Restricting USB Devices
- Disk Encryption With LUKS
- Restricting cron Access
- Disable Ctrl+Alt+Del (Demo)
- Importance of Adding Banners and MOTD (Demo)
- Implementing Logging
- Module 18 Overview: Implementing Logging
- Key Log File Locations
- Log Management (Demo)
- Log Rotation (Demo)
- Services Logging With Journald: journalctl
- Third-Party Logging Agents
- Implementing and Configuring Firewalls
- Module 19 Overview: Implementing and Configuring Firewalls
- Access Control Lists
- Firewall Operation Types: Logging, Stateful and Stateless
- Netfilter Overview
- iptables Overview: Chains, Tables and Persistency
- Firewalld (Demo): Zones and Run Time
- ufw Configuration
- IP Forwarding
- Dynamic Rule Set: DenyHosts
- Dynamic Rule Set (Demo): Fail2ban
- Dynamic Rule Set: IPset
- Common Application Port Configurations
- Linux Backup, Restore, and Compression
- Module 20 Overview: Linux Backup, Restore and Compression
- Archive and Restore Utilities (Demo)
- Compression Utilities (Demo)
- Backup Types
- Transfer Utilities (Demo)
- Integrity Checks With Hashing
- Troubleshoot System Problems
- Module 21 Overview: Troubleshooting System Problems
- Network Concepts and Terms
- Network Configuration Troubleshooting
- Network Troubleshooting with netstat and ss
- Latency Troubleshooting
- Network Performance Troubleshooting
- Name Resolution Troubleshooting
- Network Security Troubleshooting
- Network Mapping and Protocol Analyzers
- Disk Space Monitoring
- Disk Latency Troubleshooting
- I/O Scheduler Overview
- Storage Repair (Demo)
- CPU Monitoring
- CPU Troubleshooting
- Memory Overview
- Memory Swapping
- Memory Troubleshooting (Demo)
- Recovering Lost Root Password
- Process Management
- Module 22 Overview: Process Management
- Process Monitoring
- Process States
- Process Management Commands
- Process Termination Commands
- Process Priority
- Troubleshooting User Issues
- Module 23 Overview: Troubleshooting User Issues
- Troubleshoot File and Directory Permissions
- Local Access Troubleshooting
- Remote Access Troubleshooting
- Troubleshooting Authentication
- File Creation Troubleshooting
- Environment and Shell Issues
- Troubleshooting Application and Hardware Issues
- Module 24 Overview: Troubleshooting Applications and Hardware
- Storage Troubleshooting
- Storage Adapter Troubleshooting
- Storage Integrity (Demo)
- Firewall Troubleshooting
- Permission Troubleshooting
- Dependency Issues Part 1
- Dependency Issues Part 2
- Troubleshooting Hardware
- Hardware Troubleshooting Commands (Demo)
- BASH Scripting
- Module 25 Overview: BASH Scripting
- BASH Shell Environment (Demo)
- Script Sourcing, Permissions, Extensions and BASH Path
- Commenting and Escaping Characters
- Redirection and Piping
- File Globbing and Shell Expansions
- Escaping Characters
- Command Line Arguments and Positional Parameters
- Exit Codes
- Condition Tests
- Conditional Statements
- Looping in BASH
- Version Control in Git
- Module 26 Overview: Version Control in Git
- Git Installation (Demo)
- Git Initialization (Demo)
- Basic Git Commands (Demo)
- Advanced Git Commands
- Orchestration Processes and Concepts
- Module 27 Overview: Orchestration Processes and Concepts
- Orchestration and Monitoring
- Orchestration Procedures, Attributes and Inventory
- Infrastructure as Code
- Course Conclusion
Taught by
Rob Goelz
Related Courses
A Beginner's Guide to Kubernetes for Container OrchestrationPackt via FutureLearn Beginner’s Guide to Containers and Orchestration
A Cloud Guru Changing Architectures from Containers to Serverless
A Cloud Guru Google Certified Professional Cloud Architect
A Cloud Guru Implementing a Full CI/CD Pipeline
A Cloud Guru