Fundamentals of Linux Administration Certification Training

Learn the In-demand Linux Administration Skills to Grow Your Career!

40 hours | Self-paced training| 12 months access

USD 499

one-time payment only
• Access to Industry Experts
• Free Practice Test
• 10 Training Modules

REQUEST PROGRAM INFO

Companies currently employing Certified Linux Specialists include:

Skills you will learn

Learn commands for installation, searches and manipulating files in a Linux environment.

Learn how to manage boot processes and security, schedule jobs, update system, monitor system performance.

Understand users and groups management. Add, delete, modify or configure LDAP and PAM.

Learn how to maintain network performance.


Get hands-on experience for DNS, Shares, SSH and SELinux/AppArmor configuration and setup servers for DHCP and HTTP.

Build expertise on system management by using partitions, logical and physical volumes, ACLs, quotas and clustering.

About the Training

The Linux System Administrator bootcamp is vetted and designed by industry experts that covers the administration and configuration of Linux families: Red Hat, SUSE, Debian or Ubuntu. Upon training completion, the students will be awarded a free practice exam and certification of complementation from the University.

HOW MUCH DOES A LINUX ADMIN CERTIFIED MAKE?
  • Senior Systems Administrator | $100,000
  • Systems Engineer, IT | $85,000
  • Linux Systems Administrator | $78,000

payscale.com

WHAT ARE THE PREREQUISITES OF THIS COURSE?
  • No prior experience with Linux or Unix
  • System administrators, developers, architects, decision-makers or new Linux users
  • Who are looking to work with Linux system administration, network management and enterprise system architecture

Course Outline

Chapter 01: Introduction to LFS
  • Relationship to LFS101x
  • Using as LFCS Exam Preparation
  • Course Formatting
  • Read the Documentation
  • Target Platform
  • Command Line vs Graphical Interface
  • Target Linux Distributions
  • Installation: What to Use for this Course
  • Course Timing
  • Lab Exercises
  • Change, Repetition, and Holy Wars
  • The Linux Foundation
  • Linux Foundation Training
  • Labs
Chapter 02: System Startup and Shutdown
  • Understanding the Boot Sequence
  • BIOS
  • Boot Loaders
  • Configuration Files in /etc
  • /etc/sysconfig
  • /etc/default
  • Shutting Down and Rebooting
  • Labs
Chapter 03: GRUB
  • What is GRUB?
  • Interactive Selections with GRUB at Boot
  • Installing GRUB
  • GRUB Device Nomenclature
  • Customizing the GRUB Configuration File
  • Labs
Chapter 04: init: SystemV, Upstart, systemd
  • The init Process
  • Startup Alternatives
  • SysVinit Runlevels
  • SysVinit and /etc/inittab
  • SysVinit Startup Scripts
  • chkconfig
  • service
  • chkconfig and service on Debian-based Systems
  • Upstart
  • Upstart Utilities
  • systemd
  • systemd Configuration Files
  • Systemctl
  • Labs
Chapter 05: Linux Filesystem Tree Layout
  • One Big File system
  • Data Distinctions
  • FHS Linux Standard Directory Tree
  • Main Directory Layout
  • The root (/) Directory and Filesystem
  • /bin
  • /root
  • Other Files and Directories in /boot
  • /dev
  • /etc
  • /home
  • /lib
  • /media
  • /mnt
  • /opt
  • /proc
  • /sys
  • /root
  • /sbin
  • /tmp
  • /usr
  • /var
  • /run
  • Labs
Chapter 06: Kernel Services and Configuration
  • Advantages of Kernel Modules
  • Module Utilities
  • Module Loading and Unloading
  • modprobe
  • Some Considerations with Modules
  • modinfo
  • Module Parameters
  • Kernel Module Configuration
  • Labs
Chapter 07: Devices and udev
  • Device Nodes
  • Major and Minor Numbers
  • udev
  • udev Components
  • udev and Hotplug
  • udev Rule Files
  • Creating udev Rules
  • Some Examples of Rules Files
  • Labs
Chapter 08: Partitioning and Formatting Disks
  • Common Disk Types
  • Disk Geometry
  • Partitioning
  • Why partition?
  • Partition Table
  • Naming Disk Devices and Nodes
  • More on SCSI Device Names
  • blkid and lsblk
  • Sizing up partitions
  • Backing up and Restoring Partition Tables
  • Partition table editors
  • Using fdisk
  • Labs
Chapter 09: Encrypting Disks
  • Why Use Encryption?
  • LUKS
  • cryptsetup
  • Using an Encrypted Partition
  • Mounting at Boot
  • Labs
Chapter 10: Linux Filesystems and the VFS
  • Filesystem Basics
  • Filesystem Tree Organization
  • Virtual File System (VFS)
  • Available Filesystems
  • Journalling Filesystems
  • Current Filesystem Types
  • Special Filesystems
  • Labs
Chapter 11: Filesystem Features: Attributes, Creating, Checking, Mounting
  • Inodes
  • Directory Files
  • Extended Attributes and lsattr/chattr
  • Creating and Formatting Filesystems
  • Checking and Fixing Filesystems
  • Mounting and Unmounting Filesystems
  • mount
  • mount Options
  • umount
  • Mounting Filesystems at Boot
  • Listing Currently Mounted Filesystems
  • Labs
Chapter 12: Filesystem Features: Swap, Quotas, Usage
  • Swap
  • Quotas
  • Setting up Quotas
  • quotacheck
  • Turning quotas on and off
  • Examining Quotas
  • Setting quotas
  • Filesystem Usage
  • Disk Space Usage
  • Labs
Chapter 13: The Ext2/Ext3/Ext4 Filesystems
  • Ext4 History and Basics
  • Ext4 Features
  • Ext4 Layout
  • Block Groups
  • dumpe2fs
  • tune2fs
  • Superblock Information
  • Data Blocks and Inodes
  • Ext4 Filesystem Enhancements
  • Labs
Chapter 14: The XFS and btrfs Filesystems
  • XFS Features
  • XFS Filesystem Maintenance
  • The btrfs Filesystem
  • Labs
Chapter 15: Logical Volume Management (LVM)
  • LVM
  • LVM and RAID
  • Volumes and Volume Groups
  • Logical Volumes Utilities
  • Creating Logical Volumes
  • Displaying Logical Volumes
  • Resizing Logical Volumes
  • Examples of Resizing
  • LVM Snapshots
  • Labs
Chapter 16: RAID
  • RAID
  • RAID Levels
  • Software RAID Configuration
  • Monitoring RAIDs
  • RAID Hot Spares
  • Labs
Chapter 17: Local System Security
  • Local System Security
  • Creating a Security Policy
  • What to Include in the Policy
  • What Risks to Assess
  • Choosing a Security Philosophy
  • Some General Security Guidelines
  • Updates and Security
  • Hardware Accessibility and Vulnerability
  • Hardware Access Guidelines
  • Protection of BIOS
  • Protecting the Boot Loader with Passwords
  • Filesystem Security: mount Options
  • setuid and setgid
  • Setting the setuid/setgid Bits
  • Labs
Chapter 18: Linux Security Modules
  • What are Linux Security Modules?
  • LSM Choices
  • SELinux Overview
  • SELinux Modes
  • SELinux Policies
  • Context Utilities
  • SELinux and Standard Command Line Tools
  • SELinux Context Inheritance and Preservation
  • restorecon
  • semanage fcontext
  • Using SELinux Booleans
  • getsebool and setsebool
  • Troubleshooting Tools
  • Additional Online Resources
  • AppArmor
  • Labs
Chapter 19: Processes
  • Processes, Programs and Threads
  • The init Process
  • Processes
  • Process Attributes
  • Controlling Processes with ulimit
  • Process Permissions and setuid
  • Process States
  • Execution Modes
  • User Mode
  • System Mode
  • Daemons
  • Kernel-Created Processes
  • Process Creating and Forking
  • Creating Processes in a Command Shell
  • Using nice to Set Priorities
  • Modifying the Nice Value
  • Labs
Chapter 20: Signals
  • What are Signals?
  • Types of Signals
  • kill
  • killall and pkill
  • Labs
Chapter 21: System Monitoring
  • Available Monitoring Tools
  • The /proc and /sys Pseudo-filesystems
  • /proc Basics
  • A Survey of /proc
  • /proc/sys
  • /sys Basics
  • A Survey of /sys
  • sar
  • Labs
Chapter 22: Process Monitoring
  • Monitoring Tools
  • Viewing Process States with ps
  • BSD Option Format for ps
  • ps Output Fields
  • UNIX Option Format for ps
  • Customizing the ps Output
  • Using pstree
  • Viewing System Loads with top
  • top Options
  • Labs
Chapter 23: I/O Monitoring and Tuning
  • Disk Bottlenecks
  • iostat
  • iostat Options
  • iostat Extended Options
  • iotop
  • Using ionice to Set I/O Priorities
  • Labs
Chapter 24: I/O Scheduling
  • I/O Scheduling
  • I/O Scheduler Choices
  • I/O Scheduling and SSD Devices
  • Tunables and Switching The I/O Scheduler at Run Time
  • CFQ (Completely Fair Queue Scheduler)
  • CFQ Tunables
  • Deadline Scheduler
  • Deadline Tunables
  • Labs
Chapter 25: Memory: Monitoring Usage and Tuning
  • Memory Tuning Considerations
  • Memory Monitoring Tools
  • /proc/sys/vm
  • vmstat
  • /proc/meminfo
  • OOM Killer
  • Labs
Chapter 26: Package Management Systems
  • Software Packaging Concepts
  • Why Use Packages?
  • Packages Types
  • Available Package Management Systems
  • Packaging Tool Levels and Varieties
  • Package Sources
  • Creating Software Packages
  • Labs
Chapter 27: RPM
  • RPM
  • Advantages of Using RPM
  • Package File Names
  • Database Directory
  • Helper Programs and Modifying Settings
  • Queries
  • Verifying Packages
  • Installing Packages
  • Uninstalling Packages
  • Upgrading Packages
  • Freshening Packages
  • Upgrading the Kernel
  • Using rpm2cpio
  • Labs
Chapter 28: DPKG
  • DPKG Essentials
  • Package File Names
  • Source Packages
  • DPKG Queries
  • Installing/Upgrading/Uninstalling Packages
  • Labs
Chapter 29: yum
  • Package Installers
  • What Is yum?
  • Configuring yum to Use Repositories
  • Repository Files
  • Queries
  • Verifying Packages
  • Installing/Removing/Upgrading Packages
  • Additional Commands
  • Labs
Chapter 30: zypper
  • What Is zypper?
  • zypper Queries
  • Installing/Removing/Upgrading
  • Additional zypper Commands
  • Labs
Chapter 27: RPM
  • RPM
  • Advantages of Using RPM
  • Package File Names
  • Database Directory
  • Helper Programs and Modifying Settings
  • Queries
  • Verifying Packages
  • Installing Packages
  • Uninstalling Packages
  • Upgrading Packages
  • Freshening Packages
  • Upgrading the Kernel
  • Using rpm2cpio
  • Labs
Chapter 31: APT
  • What Is APT?
  • apt-get
  • Queries Using apt-cache
  • Installing/Removing/Upgrading
  • Labs
Chapter 32: User Account Management
  • User Accounts
  • Attributes of a User Account
  • Creating User Accounts with useradd
  • Modifying and Deleting User Accounts
  • Locked Accounts
  • User IDs and /etc/passwd
  • /etc/shadow
  • Why Use /etc/shadow?
  • Password Management
  • chage: Password Aging
  • Restricted shell
  • Restricted Accounts
  • The root Account
  • SSH
  • ssh Configuration Files
  • Labs
Chapter 33: Group Management
  • Groups
  • Group Management
  • User Private Groups
  • Group Membership
  • Labs
Chapter 34: File Permissions and Ownership
  • Owner, Group and World
  • File Access Rights
  • File Permissions and Security and Authentication
  • Changing permissions: chmod
  • chmod: Numerical Syntax for Permissions
  • Changing User and Group File Ownership: chown and chgrp
  • umask
  • Filesystem ACLs
  • Getting and Setting ACLs
  • Labs
Chapter 35: Pluggable Authentication Modules (PAM)
  • PAM: A Unified Approach to Authentication
  • Authentication Process
  • PAM Configuration Files
  • PAM Rules
  • LDAP Authentication
  • Labs
Chapter 36: Backup and Recovery Methods
  • Why Backups?
  • What Needs Backup?
  • Tape Drives
  • Backup Methods
  • Backup Strategies
  • Backup Utilities
  • cpio
  • Using tar for Backups
  • Using tar for Restoring Files
  • Incremental Backups with tar
  • Compression: gzip, bzip2 and xz and Backups
  • dd
  • dd Examples
  • rsync
  • dump and restore
  • dump Options
  • Level 0 backup with dump
  • restore
  • mt
  • Backup Programs
  • Labs
Chapter 37: Network Devices and Configuration
  • Network Devices
  • Problems with Network Device Names
  • Predictable Network Interface Device Names
  • Examples of the New Naming Scheme
  • NIC Configuration Files
  • ifconfig
  • The ip Utility
  • Examples of Using ip
  • Routing
  • Default Route
  • Static Routes
  • Name Resolution
  • /etc/hosts
  • DNS
  • Network Diagnostic Utilities
  • Labs
Chapter 38: Firewalls
  • What is a Firewall
  • Firewall Interfaces and Tools
  • firewalld
  • firewalld Service Status
  • Zones
  • Zone Management
  • Source Management
  • Service and Port Management
  • Labs
Chapter 39: Basic Troubleshooting
  • Troubleshooting Overview
  • Basic Techniques
  • Intuition and Experience
  • Things to Check: Networking
  • Things to Check: File Integrity
  • Boot Process Failures
  • Filesystem Corruption and Recovery
  • Using Rescue/Recovery Media
  • Common Utilities on Rescue/Recovery Disks
  • Using Rescue/Recovery Media
  • Labs
Chapter 40: System Rescue
  • Emergency Boot Media
  • Using Rescue Media
  • Rescue USB Key
  • Emergency Mode
  • Single User Mode
  • Labs

Our Online Training Program

Top-notch Learning Experience

Texas A&M online education program allows you to learn IT skills immediately applicable in the professional sphere, while the flexible class schedule also maintain your current employment or academic activities and deliver effective learning. Texas A&M Kingsville is the premier learning institution which offers critical skill-centric training for professionals and students alike.

Premium Reputation

Texas A&M University System is a unique institution in the higher education landscape, recognized in many ways for its combination of excellence, affordability, and ability to develop leaders of character who have an impact on the state, nation, and world. It combines the principles of practical education and outreach that are legacies of its land, sea, and space grant designations with the advanced research mission characteristic of membership in the Association of American Universities (AAU).

Certificate of Completion

The course prepares you for success with key topics such as Linux I/O monitoring, user account management, group management scalable networks, and maintenance, monitoring, and troubleshooting. Students will receive a certificate of completion upon completing all modules.

Students will receive a certificate of completion upon completing all modules.

Ready to make the commitment?

click here