Details
Outline
Module 1: What is Linux?
- Unix and its Design Principles
- FSF and GNU
- GPL – General Public License
- The Linux Kernel
- Linux Kernel and Versioning
- Components of a Distribution
- Slackware
- SUSE Linux Products
- Debian
- Ubuntu
- Red Hat Linux Products
- Oracle Linux
Module 2: Login and exploration
- Logging In
- Running Programs
- Interacting with Command Line
- Desktop Environments
- GNOME
- Starting X
- Gathering Login Session Info
- Gathering System Info
- uptime & w
- got root?
- Switching User Contexts
- sudo
- Help from Commands and Documentation
- whereis
- Getting Help Within the Graphical Desktop
- Getting Help with man & info
- $MANPATH, whatis and apropos
Module 3: The Linux filesystem
- Filesystem Support
- Unix/Linux Filesystem Features
- Filesystem Hierarchy Standard
- Navigating the Filesystem
- Displaying Directory Contents
- Filesystem Structures
- Determining Disk Usage With df and du
- Determining Disk Usage (GUI)
- Disk Usage with Quotas
- File Ownership
- Default Group Ownership
- File and Directory Permissions
- File Creation Permissions with umask
- SUID and SGID on files
- SGID and Sticky Bit on Directories
- Changing File Permissions
- User Private Group Scheme
Module 4: Manipulating files
- Directory Manipulation
- File Manipulation
- Deleting and Creating Files
- Managing Files Graphically
- Drag and drop with Nautilus
- Physical Unix File Structure
- Filesystem Links
- File Extensions and Content
- Displaying Files
- Previewing Files
- Producing File Statistics
- Displaying Binary Files
- Searching the Filesystem
- Alternate Search Method
Module 5: Shell basics
- Role of Command Shell
- Communication Channels
- File Redirection
- Piping Commands Together
- Filename Matching
- File Globbing and Wildcard Patterns
- Brace Expansion
- Shell and Environment Variables
- Key Environment Variables
- Which and Type
- General Quoting Rules
- Nesting Commands
Module 6: Archiving and compression
- Archives with tar
- Archives with cpio
- The gzip Compression Utility
- The bzip2 Compression Utility
- The XZ Compression Utility
- The PKZIP Archiving/Compression format
- GNOME File Roller
Module 7: Text processing
- Searching Inside Files
- The Streaming Editor
- Text Processing with Awk
- Replacing Text Characters
- Text Sorting
- Duplicate Removal Utility
- Extracting Columns of Text
- Combining Files and Merging Text
- Comparing File Changes
Module 8: Regular expressions
- Regular Expression Overview
- Regular Expression Implementations
- Regular Expressions
- RE Character Classes
- Regex Quantifiers
- RE Parenthesis
Module 9: Text editing
- Text Editing
- Pico/GNU Nano
- Pico/Nano Interface
- Nano configuration
- Pico/Nano Shortcuts
- vi and Vim
- Learning Vim
- Basic vi
- Intermediate vi
Module 10: Messaging
- System Messaging Commands
- Controlling System Messaging
- Internet Relay Chat
- Instant Messenger Clients
- Electronic Mail
- Sending Email with sendmail
- Sending and Receiving Email with mailx
- Sending and Receiving Email with mutt
- Sending Email with Pine
- Evolution
Module 11: Command shells
- Shells
- Identifying the Shell
- Changing the Shell
- Shell Configuration Files
- Script Execution
- Bourne Shell: Shell Prompts
- Bash: Bourne-Again Shell
- Bash: Configuration Files
- Bash: Command Line History
- Bash: Command Editing
- Bash: Command Completion
- Bash: "shortcuts"
- Bash: prompt
- Setting Resource Limits via ulimit
Module 12: Introduction to shell scripting
- Shell Script Strengths and Weaknesses
- Example Shell Script
- Positional Parameters
- Input & Output
- Doing Math
- Exit Status
- Comparisons with test
- Conditional Statements
- Flow Control: case
- The borne for-Loop
- The while and until Loops
Module 13: Process management and job control
- What is a Process?
- Process Lifecycle
- Process States
- Viewing Processes
- Signals
- Tools to Send Signals
- nohup and disown
- Managing Processes
- Tuning Process Scheduling
- Job Control Overview
- Job Control Commands
- Persistent Shell Sessions with tmux
- Persistent Shell Sessions with Screen
- Using screen
- Advanced Screen
Module 14: AT and CRON
- Automating Tasks
- at/batch
- cron
- The crontab Command
- crontab Format
- /etc/cron.*/ Directories
- Anacron
- Systemd Timers
Module 15: Managing software
- Downloading with FTP
- FTP
- lftp
- Command Line Internet – Non-interactive
- Command Line Internet – Interactive
- Managing Software Dependencies
- Using the Yum & DNF commands
- Using Yum history
- Yum package groups
- Configuring Yum
- dnf download & yumdownloader (deprecated)
- Popular Yum Repositories
- Using the Zypper command
- Zypper Services and Catalogs
- The dselect & APT Frontends to dpkg
- Aptitude
- Configuring APT
Module 16: The secure shell (SSH)
- Secure Shell
- OpenSSH Client & Server Configuration
- Accessing Remote Shells
- Transferring Files
- Alternative sftp Clients
- SSH Key Management
- ssh-agent
Module 17: Mounting filesystems & managing removable media
- Filesystems Concept Review
- Mounting Filesystems
- NFS
- SMB
- Filesystem Table (/etc/fstab)
- AutoFS
- Removable Media
Module 18: Printing
- Legacy Print Systems
- Common UNIX Printing System
- Defining a Printer
- Standard Print Commands
- Format Conversion Utilities
- enscript and mpage
Our goal is to offer quality and up-to-date training courses, while following the latest trends in technology and applications. These are courses that target the real and concrete needs of our customers, ensuring that the knowledge acquired is put into practice. Additionally, many prepare our participants for certification exams with the brands we are accredited with - Microsoft, EC-Council, CompTIA, and PeopleCert.
Eccentrix has the most comprehensive offer in terms of Microsoft accredited trainings. In addition, a complete set of benefits comes with each enrollment to our trainings. Since the very beginning of our operations, Eccentrix has been a Microsoft Partner in learning following the numerous changes in the learning paths and programs, notably for certification-based courses.
EC-Council
Eccentrix has the highest level of EC-Council partnership, delivering the complete portfolio of EC-Council cybersecurity courses since 2017. With an EC-Council course comes a set of benefits that greatly help our participants get certified. EC-Council is a key vendor for Eccentrix, since we have a strong focus on cybersecurity courses and that relationships just gets better over the years. ...