Linux system administration is one of the most in-demand skills in IT. Whether you're looking for expert test prep for the Linux Foundation Certified System Administration certification, need training to help start a new Linux IT career, transition to Linux from another platform, or you're just brushing up on your sysadmin skills, this course will teach you what you need to know.
This course gives you all the skills and information you need to pass the LFCS exam and work as a professional Linux system administrator.
In this course you’ll learn:
- How to administer, configure and upgrade Linux systems running one of the three major Linux distribution families: Red Hat, SUSE, Debian/Ubuntu.
- How to master the tools and concepts you’ll need to efficiently build and manage an enterprise Linux infrastructure.
- How to use state-of-the-art system administration techniques in real-life scenarios via practical labs.
- And more.
Voraussetzungen
This course is designed to provide students with the necessary skills and abilities to work as a professional Linux system administrator. Students should have basic knowledge of Linux and its most common utilities and text editors.
Inhalt
Introduction
- Linux Foundation
- Linux Foundation Training
- Laboratory Exercises
- Distribution Details
- Obtaining Class Solutions and Resources
- Registration
System Startup and Shutdown
- Understanding the Boot Sequence
- The Grand Unified Boot Loader
- GRUB Configuration Files
- System Configuration Files in /etc
- The init Process
- SysVinit Startup
- chkconfig and service
- Upstart
- systemd
- Shutting down/Rebooting the System
Linux Filesystem Tree Layout
- Data Distinctions
- FHS Linux Standard Directory Tree
- root (/) directory
- /bin
- /dev
- /etc
- /home
- /lib and /lib64
- /media
- /mnt
- /opt
- /proc
- /sys
- /root
- /sbin
- /tmp
- /usr
- /var
- /run
Kernel Services and Configuration
- Kernel Overview
- Kernel Configuration
- sysctl
- Kernel Modules
- Module Utilities
- Module Configuration
- udev and Device Management
Partitioning and Formatting Disks
- Common Disk Types
- Disk Geometry
- Partitioning
- Naming Disk Devices
- Sizing up partitions
- Partition table editors
Linux Filesystems
- Some Notes About Filesystems
- Virtual Filesystem (VFS)
- Filesystem Concepts
- Disk and Filesystem Usage
- Extended Attributes
- ext4
- XFS
- btrfs
- Creating and formatting filesystems
- Checking and Repairing Filesystems
- Mounting filesystems
- Swap
- Filesystem Quotas
RAID and LVM
- RAID
- RAID Levels
- Software RAID Configuration
- Logical Volume Management (LVM)
- Volumes and Volume Groups
- Working with Logical Volumes
- Resizing Logical Volumes
- LVM Snapshots
Processes
- Programs and Processes
- Process States
- Execution Modes
- Daemons
- Creating Processes
- Process Limits
- Process Monitoring
- Signals
- niceness
- Libraries
Package Management Systems
- Software Packaging Concepts
- RPM (Red Hat Package Manager)
- DPKG (Debian Package)
- Revision Control Systems
Package Installers
- Package Installers
- yum
- zypper
- APT
User and Group Account Management
- User Accounts
- Management
- Passwords
- Restricted Shells and Accounts
- The root Account
- Group Management
- PAM (Pluggable Authentication Modules)
- Authentication Process
- Configuring PAM
- LDAP Authentication
- File Permissions and Ownership
- SSH
Backup and Recovery Methods
- Backup Basics
- cpio
- tar
- Compression: gzip, bzip2 and xz and Backups
- dd
- rsync
- dump and restore
- mt
- Backup Programs
Networking
- IP Addresses
- Hostnames
- Configuring Network Interfaces
- Routing
- Name Resolution
- Network Diagnostics
Firewalls
- Firewalls
- Interfaces
- firewalld
- Zones
- Source Management
- Service and Port Management
Local System Security
- Local System Security
- Creating a Security Policy
- Updates and Security
- Physical Security
- Filesystem Security
- Linux Security Modules
Basic Troubleshooting and System Rescue
- Troubleshooting Overview
- Things to Check: Networking
- Boot Process Failures
- Filesystem Corruption and Recovery
- Virtual Consoles
- Rescue Media and Troubleshooting
- System Rescue and Recovery
Evaluation Survey
- Understanding the Boot Sequence
- The Grand Unified Boot Loader
- GRUB Configuration Files
- System Configuration Files in /etc
- The init Process
- SysVinit Startup
- chkconfig and service
- Upstart
- systemd
- Shutting down/Rebooting the System
Linux Filesystem Tree Layout
- Data Distinctions
- FHS Linux Standard Directory Tree
- root (/) directory
- /bin
- /dev
- /etc
- /home
- /lib and /lib64
- /media
- /mnt
- /opt
- /proc
- /sys
- /root
- /sbin
- /tmp
- /usr
- /var
- /run
Kernel Services and Configuration
- Kernel Overview
- Kernel Configuration
- sysctl
- Kernel Modules
- Module Utilities
- Module Configuration
- udev and Device Management
Partitioning and Formatting Disks
- Common Disk Types
- Disk Geometry
- Partitioning
- Naming Disk Devices
- Sizing up partitions
- Partition table editors
Linux Filesystems
- Some Notes About Filesystems
- Virtual Filesystem (VFS)
- Filesystem Concepts
- Disk and Filesystem Usage
- Extended Attributes
- ext4
- XFS
- btrfs
- Creating and formatting filesystems
- Checking and Repairing Filesystems
- Mounting filesystems
- Swap
- Filesystem Quotas
RAID and LVM
- RAID
- RAID Levels
- Software RAID Configuration
- Logical Volume Management (LVM)
- Volumes and Volume Groups
- Working with Logical Volumes
- Resizing Logical Volumes
- LVM Snapshots
Processes
- Programs and Processes
- Process States
- Execution Modes
- Daemons
- Creating Processes
- Process Limits
- Process Monitoring
- Signals
- niceness
- Libraries
Package Management Systems
- Software Packaging Concepts
- RPM (Red Hat Package Manager)
- DPKG (Debian Package)
- Revision Control Systems
Package Installers
- Package Installers
- yum
- zypper
- APT
User and Group Account Management
- User Accounts
- Management
- Passwords
- Restricted Shells and Accounts
- The root Account
- Group Management
- PAM (Pluggable Authentication Modules)
- Authentication Process
- Configuring PAM
- LDAP Authentication
- File Permissions and Ownership
- SSH
Backup and Recovery Methods
- Backup Basics
- cpio
- tar
- Compression: gzip, bzip2 and xz and Backups
- dd
- rsync
- dump and restore
- mt
- Backup Programs
Networking
- IP Addresses
- Hostnames
- Configuring Network Interfaces
- Routing
- Name Resolution
- Network Diagnostics
Firewalls
- Firewalls
- Interfaces
- firewalld
- Zones
- Source Management
- Service and Port Management
Local System Security
- Local System Security
- Creating a Security Policy
- Updates and Security
- Physical Security
- Filesystem Security
- Linux Security Modules
Basic Troubleshooting and System Rescue
- Troubleshooting Overview
- Things to Check: Networking
- Boot Process Failures
- Filesystem Corruption and Recovery
- Virtual Consoles
- Rescue Media and Troubleshooting
- System Rescue and Recovery
Evaluation Survey
- Kernel Overview
- Kernel Configuration
- sysctl
- Kernel Modules
- Module Utilities
- Module Configuration
- udev and Device Management
Partitioning and Formatting Disks
- Common Disk Types
- Disk Geometry
- Partitioning
- Naming Disk Devices
- Sizing up partitions
- Partition table editors
Linux Filesystems
- Some Notes About Filesystems
- Virtual Filesystem (VFS)
- Filesystem Concepts
- Disk and Filesystem Usage
- Extended Attributes
- ext4
- XFS
- btrfs
- Creating and formatting filesystems
- Checking and Repairing Filesystems
- Mounting filesystems
- Swap
- Filesystem Quotas
RAID and LVM
- RAID
- RAID Levels
- Software RAID Configuration
- Logical Volume Management (LVM)
- Volumes and Volume Groups
- Working with Logical Volumes
- Resizing Logical Volumes
- LVM Snapshots
Processes
- Programs and Processes
- Process States
- Execution Modes
- Daemons
- Creating Processes
- Process Limits
- Process Monitoring
- Signals
- niceness
- Libraries
Package Management Systems
- Software Packaging Concepts
- RPM (Red Hat Package Manager)
- DPKG (Debian Package)
- Revision Control Systems
Package Installers
- Package Installers
- yum
- zypper
- APT
User and Group Account Management
- User Accounts
- Management
- Passwords
- Restricted Shells and Accounts
- The root Account
- Group Management
- PAM (Pluggable Authentication Modules)
- Authentication Process
- Configuring PAM
- LDAP Authentication
- File Permissions and Ownership
- SSH
Backup and Recovery Methods
- Backup Basics
- cpio
- tar
- Compression: gzip, bzip2 and xz and Backups
- dd
- rsync
- dump and restore
- mt
- Backup Programs
Networking
- IP Addresses
- Hostnames
- Configuring Network Interfaces
- Routing
- Name Resolution
- Network Diagnostics
Firewalls
- Firewalls
- Interfaces
- firewalld
- Zones
- Source Management
- Service and Port Management
Local System Security
- Local System Security
- Creating a Security Policy
- Updates and Security
- Physical Security
- Filesystem Security
- Linux Security Modules
Basic Troubleshooting and System Rescue
- Troubleshooting Overview
- Things to Check: Networking
- Boot Process Failures
- Filesystem Corruption and Recovery
- Virtual Consoles
- Rescue Media and Troubleshooting
- System Rescue and Recovery
Evaluation Survey
- Some Notes About Filesystems
- Virtual Filesystem (VFS)
- Filesystem Concepts
- Disk and Filesystem Usage
- Extended Attributes
- ext4
- XFS
- btrfs
- Creating and formatting filesystems
- Checking and Repairing Filesystems
- Mounting filesystems
- Swap
- Filesystem Quotas
RAID and LVM
- RAID
- RAID Levels
- Software RAID Configuration
- Logical Volume Management (LVM)
- Volumes and Volume Groups
- Working with Logical Volumes
- Resizing Logical Volumes
- LVM Snapshots
Processes
- Programs and Processes
- Process States
- Execution Modes
- Daemons
- Creating Processes
- Process Limits
- Process Monitoring
- Signals
- niceness
- Libraries
Package Management Systems
- Software Packaging Concepts
- RPM (Red Hat Package Manager)
- DPKG (Debian Package)
- Revision Control Systems
Package Installers
- Package Installers
- yum
- zypper
- APT
User and Group Account Management
- User Accounts
- Management
- Passwords
- Restricted Shells and Accounts
- The root Account
- Group Management
- PAM (Pluggable Authentication Modules)
- Authentication Process
- Configuring PAM
- LDAP Authentication
- File Permissions and Ownership
- SSH
Backup and Recovery Methods
- Backup Basics
- cpio
- tar
- Compression: gzip, bzip2 and xz and Backups
- dd
- rsync
- dump and restore
- mt
- Backup Programs
Networking
- IP Addresses
- Hostnames
- Configuring Network Interfaces
- Routing
- Name Resolution
- Network Diagnostics
Firewalls
- Firewalls
- Interfaces
- firewalld
- Zones
- Source Management
- Service and Port Management
Local System Security
- Local System Security
- Creating a Security Policy
- Updates and Security
- Physical Security
- Filesystem Security
- Linux Security Modules
Basic Troubleshooting and System Rescue
- Troubleshooting Overview
- Things to Check: Networking
- Boot Process Failures
- Filesystem Corruption and Recovery
- Virtual Consoles
- Rescue Media and Troubleshooting
- System Rescue and Recovery
Evaluation Survey
- Programs and Processes
- Process States
- Execution Modes
- Daemons
- Creating Processes
- Process Limits
- Process Monitoring
- Signals
- niceness
- Libraries
Package Management Systems
- Software Packaging Concepts
- RPM (Red Hat Package Manager)
- DPKG (Debian Package)
- Revision Control Systems
Package Installers
- Package Installers
- yum
- zypper
- APT
User and Group Account Management
- User Accounts
- Management
- Passwords
- Restricted Shells and Accounts
- The root Account
- Group Management
- PAM (Pluggable Authentication Modules)
- Authentication Process
- Configuring PAM
- LDAP Authentication
- File Permissions and Ownership
- SSH
Backup and Recovery Methods
- Backup Basics
- cpio
- tar
- Compression: gzip, bzip2 and xz and Backups
- dd
- rsync
- dump and restore
- mt
- Backup Programs
Networking
- IP Addresses
- Hostnames
- Configuring Network Interfaces
- Routing
- Name Resolution
- Network Diagnostics
Firewalls
- Firewalls
- Interfaces
- firewalld
- Zones
- Source Management
- Service and Port Management
Local System Security
- Local System Security
- Creating a Security Policy
- Updates and Security
- Physical Security
- Filesystem Security
- Linux Security Modules
Basic Troubleshooting and System Rescue
- Troubleshooting Overview
- Things to Check: Networking
- Boot Process Failures
- Filesystem Corruption and Recovery
- Virtual Consoles
- Rescue Media and Troubleshooting
- System Rescue and Recovery
Evaluation Survey
- Package Installers
- yum
- zypper
- APT
User and Group Account Management
- User Accounts
- Management
- Passwords
- Restricted Shells and Accounts
- The root Account
- Group Management
- PAM (Pluggable Authentication Modules)
- Authentication Process
- Configuring PAM
- LDAP Authentication
- File Permissions and Ownership
- SSH
Backup and Recovery Methods
- Backup Basics
- cpio
- tar
- Compression: gzip, bzip2 and xz and Backups
- dd
- rsync
- dump and restore
- mt
- Backup Programs
Networking
- IP Addresses
- Hostnames
- Configuring Network Interfaces
- Routing
- Name Resolution
- Network Diagnostics
Firewalls
- Firewalls
- Interfaces
- firewalld
- Zones
- Source Management
- Service and Port Management
Local System Security
- Local System Security
- Creating a Security Policy
- Updates and Security
- Physical Security
- Filesystem Security
- Linux Security Modules
Basic Troubleshooting and System Rescue
- Troubleshooting Overview
- Things to Check: Networking
- Boot Process Failures
- Filesystem Corruption and Recovery
- Virtual Consoles
- Rescue Media and Troubleshooting
- System Rescue and Recovery
Evaluation Survey
- Backup Basics
- cpio
- tar
- Compression: gzip, bzip2 and xz and Backups
- dd
- rsync
- dump and restore
- mt
- Backup Programs
Networking
- IP Addresses
- Hostnames
- Configuring Network Interfaces
- Routing
- Name Resolution
- Network Diagnostics
Firewalls
- Firewalls
- Interfaces
- firewalld
- Zones
- Source Management
- Service and Port Management
Local System Security
- Local System Security
- Creating a Security Policy
- Updates and Security
- Physical Security
- Filesystem Security
- Linux Security Modules
Basic Troubleshooting and System Rescue
- Troubleshooting Overview
- Things to Check: Networking
- Boot Process Failures
- Filesystem Corruption and Recovery
- Virtual Consoles
- Rescue Media and Troubleshooting
- System Rescue and Recovery
Evaluation Survey
- Firewalls
- Interfaces
- firewalld
- Zones
- Source Management
- Service and Port Management
Local System Security
- Local System Security
- Creating a Security Policy
- Updates and Security
- Physical Security
- Filesystem Security
- Linux Security Modules
Basic Troubleshooting and System Rescue
- Troubleshooting Overview
- Things to Check: Networking
- Boot Process Failures
- Filesystem Corruption and Recovery
- Virtual Consoles
- Rescue Media and Troubleshooting
- System Rescue and Recovery
Evaluation Survey
- Troubleshooting Overview
- Things to Check: Networking
- Boot Process Failures
- Filesystem Corruption and Recovery
- Virtual Consoles
- Rescue Media and Troubleshooting
- System Rescue and Recovery
Evaluation Survey
Preis und Dauer
4 Tage, 1.890,76 € + 19% MwSt. = 2.250,00 €
Termine
- Es steht noch kein Termin für diesen Kurs fest.