LPIC-1 training course description
This five day hands on course provides a
comprehensive coverage of core Linux administration
tasks. The course covers generic Linux and is available
for any Linux distribution required. It closely follows the
LPIC curriculum allowing delegates to achieve the
relevant certification if required.
What will you learn
Administer & configure Linux systems.
Maintain Linux by handling disk space and taking
regular backups.
Manage software packages.
Perform basic troubleshooting.
Maintain a secure Linux system.
Describe the organisation and implementation of the
filesystem.
LPIC-1 training course details
Who will benefit:
System administrators.
Network administrators.
Prerequisites:
Linux fundamentals (LPI 010)
Duration
5 days
LPIC-1 training course contents
Part I Exam 101
Exploring Linux Command-Line Tools
Using a Shell, Shell Configuration, Environment
Variables, Getting Help, Streams, Redirection and Pipes,
Processing Text Using Filters, Manipulating files,
Regular Expressions, grep,sed.
Managing Software
Package Concepts, Comparison of package formats,
RPM, rpm Commands, Yum, Debian Packages, dpkg,
apt-cache, apt-get, dselect, aptitude, Converting
Between Package Formats, Dependencies and Conflicts,
Startup Script Problems, Shared Libraries, Library
Management, Managing Processes, the Kernel: The
First Process, Process Lists, Foreground & Background
Processes, Process Priorities, Killing Processes.
Configuring Hardware
Configuring Firmware and Hardware, IRQs, I/O
Addresses, DMA Addresses, Boot Disks, Coldplug and
Hotplug Devices, Configuring Expansion Cards and PCI
Cards, Kernel Modules, USB Devices, Linux USB
Drivers, Configuring Hard Disks, Partitioning Systems,
LVM, Common Layouts, Creating Partitions and
Filesystems, Maintaining Filesystem Health, Tuning,
Journals, Checking Filesystems, Monitoring Disk Use,
Mounting and Unmounting Filesystems.
Managing Files
File Management Commands, File Naming and
Wildcards, File Archiving, Links, Directory Commands,
File Ownership and Group, File access control,
Permissions, chmod, Defaults, File Attributes, Disk
Quotas, Enabling and setting Quotas, Locating Files,
The FHS.
Booting Linux and Editing Files
Installing Boot Loaders, GRUB Legacy, GRUB 2,
Alternative Boot Loaders, the Boot Process, Boot
Messages, Runlevels and the Initialization Process,
Runlevel Functions, Runlevel Services, Alternative Boot
Systems , Upstart, system.
Part II Exam 102 265
Securing the X Window System
Localization, Configuring Basic X Features, X Server
Options, Methods of Configuring X, X Display
Information, X Fonts, The X GUI Login System, XDMCP
Server, Using X for Remote Access, Screen Display
Settings, Setting Your Time Zone, Your Locale,
Configuring Printing, Conceptualizing the Linux Printing
Architecture, Understanding PostScript and Ghostscript,
Running a Printing System, Configuring CUPS,
Monitoring and Controlling the Print Queue.
Administering the System
Managing Users and Groups, Tuning User and System
Environments, Using System Log Files, Understanding
syslogd , Setting Logging Options, Manually Logging
Data, Rotating Log Files, Reviewing Log File Contents,
Maintaining the System Time, Linux Time Concepts,
Manually Setting the Time, Using NTP, Running Jobs in
the Future, Understanding the Role of cron, Creating
System cron Jobs, Creating User cron Jobs, Using
anacron, Using at.
Configuring Basic Networking
TCP/IP, Network Hardware, Network Addresses,
Hostnames, Network Ports, Configuring Linux for a
Local Network, Configuring with DHCP, Static IP
Address, Configuring Routing, Using GUI Configuration
Tools, ifup and ifdown, Diagnosing Network
Connections, Testing Connectivity, Tracing a Route,
Checking Network Status , Examining Network Traffic,
Additional Tools.
Writing Scripts, Configuring Email,
and Using Databases
The Shell Environment, Aliases, Shell Configuration
Files, Writing Scripts, Commands, Variables,
Conditional Expressions, Loops, Functions, Managing
Email, Choosing Email Software, Securing Your Email
Server, Managing Data with SQL, Picking a SQL
Package, Understanding SQL Basics, Using MySQL
Securing Your System
Administering Network Security, Super Server
Restrictions, Disabling Unused Servers, Administering
Local Security, Securing Passwords, Limiting root
Access, Setting Login, Process, SUID/SGID Files,
Configuring SSH, Using GPG, Generating, Importing
and Revoking Keys, Encrypting and Decrypting Data,
Signing Messages and Verifying Signatures.