Duration 5 Days 30 CPD hours This course is intended for Software Engineers Senior Software Engineers Java Developers DevOps Engineers Software Developers .NET Developers Systems Engineers Full Stack Developers Full Stack Java Developers Data Scientists Overview By the end of the course, you should be able to meet the following objectives: Describe the software-defined data center (SDDC) Explain the vSphere components and their function in the infrastructure Install and configure VMware ESXi⢠hosts Deploy and configure VMware vCenter Server Appliance⢠Use VMware vSphere Client⢠to manage the vCenter Server inventory and the vCenter Server configuration Manage, monitor, back up, and protect vCenter Server Appliance Create virtual networks with vSphere standard switches Describe the storage technologies supported by vSphere Configure virtual storage using iSCSI and NFS storage Create and manage VMware vSphere VMFS datastores Use the vSphere Client to create virtual machines, templates, clones, and snapshots Create a content library and deploy virtual machines from templates in the library Manage virtual machine resource use Migrate virtual machines with VMware vSphere vMotion and VMware vSphere Storage vMotion Create and manage a vSphere cluster that is enabled with VMware vSphere High Availability and VMware vSphere Distributed Resource Scheduler⢠Discuss solutions for managing the vSphere life cycle Use VMware vSphere Update Manager⢠to apply patches and perform upgrades to ESXi hosts and virtual machines This five-day course features intensive hands-on training that focuses on installing, configuring, and managing VMware vSphere© 7, which includes VMware ESXi? 7 and VMware vCenter Server© 7. This course prepares you to administer a vSphere infrastructure for an organization of any size. This course is the foundation for most of the other VMware technologies in the software-defined data center Course Introduction Introductions and course logistics Course objectives Introduction to vSphere and the Software-Defined Data Center Explain basic virtualization concept Describe how vSphere fits into the software-defined data center and the cloud infrastructure Explain how vSphere interacts with CPUs, memory, networks, and storage Recognize the user interfaces for accessing the vCenter Server system and ESXi hosts Use VMware Host Client? to access and manage ESXi host Virtual Machines Create and remove a virtual machine Provision a virtual machine with virtual devices Identify the files that make up a virtual machine Explain the importance of VMware Tools vCenter Server Describe the vCenter Server architecture Discuss how ESXi hosts communicate with vCenter Server Deploy and configure vCenter Server Appliance Use the vSphere Client to manage the vCenter Server inventory Add data center, organizational objects, and hosts to vCenter Server Use roles and permissions to enable users to access objects in the vCenter Server inventory Back up vCenter Server Appliance Monitor vCenter Server tasks, events, and appliance health Use vCenter Server High Availability to protect a vCenter Server Appliance Configuring and Managing Virtual Networks Create and manage standard switches Describe the virtual switch connection types Configure virtual switch security, traffic-shaping and load-balancing policies Compare vSphere distributed switches and standard switches Configuring and Managing Virtual Storage Identify storage protocols and storage device types Discuss ESXi hosts using iSCSI, NFS, and Fibre Channel storage Create and manage VMFS and NFS datastores Explain how multipathing works with iSCSI, NFS, and Fibre Channel storage Deploy virtual machines on a VMware vSAN? datastore Virtual Machine Management Use templates and cloning to deploy new virtual machines Modify and manage virtual machines Create a content library and deploy virtual machines from templates in the library Dynamically increase the size of a virtual disk Use customization specification files to customize a new virtual machine Perform vSphere vMotion and vSphere Storage vMotion migrations Create and manage virtual machine snapshots Examine the features and functions of VMware vSphere© Replication? Resource Management and Monitoring Discuss CPU and memory concepts in a virtualized environment Describe what overcommitment of a resource means Describe methods for optimizing CPU and memory usage Use various tools to monitor resource use Create and use alarms to report certain conditions or events vSphere Clusters Describe options for making a vSphere environment highly available Explain the vSphere HA architecture Configure and manage a vSphere HA cluster Examine the features and functions of VMware vSphere© Fault Tolerance Configure a vSphere cluster using ESXi Cluster Quickstart Describe the functions of a vSphere DRS cluster Create a vSphere DRS cluster vSphere Lifecycle Management Describe how VMware vSphere© Lifecycle Manager? works Use vSphere Lifecycle Manager to update ESXi hosts in a cluster Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware vSphere: Install, Configure, Manage [v7.0] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware vSphere: Install, Configure, Manage [v7.0] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for Experienced system administrators or network administrators Overview By the end of the course, you should be able to meet the following objectives: Describe NSX Advanced Load Balancer architecture Describe the NSX Advanced Load Balancer components and main functions Explain the NSX Advanced Load Balancer key features and benefits Explain and configure Local Load Balancing constructors such as Virtual Services, Pools, Health Monitors and related components During this one-day course, you gain an understanding of the architecture and features of VMware NSX Advanced Load Balancer (Avi Networks) solution. This course provides hands-on labs to provide a solid foundation to load balancing fundamentals and work with most common load balancing functionality offered by VMware NSX Advanced Load Balancer (Avi Networks) solution. Course Introduction Introductions and course logistics Course objectives Introduction to NSX Advanced Load Balancer Introduce NSX Advanced Load Balancer Discuss NSX Advanced Load Balancer use cases and benefits Explain NSX Advanced Load Balancer architecture and components Explain the management, control, data, and consumption planes and their respective functions Virtual Services Configuration Concepts Explain Virtual Service components Explain Virtual Service types Explain and configure basic virtual services components such as Application Profiles, Network Profiles, Pools and Health Monitors Profiles and Policies Explain and deep dive on Advanced Virtual Service creation Explain and deep dive on Application Profiles and Types such as L4, DNS, Syslog and HTTP Explain and configure advanced application HTTP Profile options Deep dive on Network Profiles and Types Explain and configure SSL Profiles and Certificates Explain and Configure HTTP and DNS policies Pools Configuration Concepts Explain and deep dive on Pools configuration options Describe available Load Balancing algorithms Explain multiple Health Monitor types Explain multiple Persistence Profiles Explain and configure Pool Groups
Duration 3 Days 18 CPD hours This course is intended for This course is suitable for anyone responsible for configuring, managing or supporting a Veeam Availability Suite v10 environment. Overview After completing this course, attendees should be able to: Describe Veeam Availability Suite components usage scenarios and relevance to their own environment. Effectively manage data availability in on-site, off-site, cloud and hybrid environments. Ensure both Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs) are met. Install and configure Veeam Availability Suite into their environment, ensuring data is protected effectively. Adapt with an organization's evolving technical, business and regulatory needs. Ensure recovery is possible, effective, efficient, secure and compliant with business and legal requirements. Provide visibility of the business data assets, and produce effective reports and dashboards to monitor performance and risks. Conduct basic troubleshooting and analysis of their Veeam Availability Suite environment. This three-day, technical deep dive Veeam© Availability Suite? v10: Configuration and Management training course is focused on teaching IT professionals the skills to configure, manage and support a Veeam Availability Suite v10 solution. With extensive hands-on-labs, the class enables administrators and engineers to effectively manage data in an ever-changing technical and business environment, bringing tangible benefit to businesses in the digital world. Introduction Describe RTOs and RPOs, what they mean for your business, how to manage and monitor performance against them The 3-2-1 Rule and its importance in formulating a successful backup strategy Identify key Veeam Availability Suite components and describe their usage scenarios Building Backup Capabilities Backup methods, the appropriate use cases and impact on underlying file systems Create, modify, optimize and delete backup jobs, including NAS Backup jobs. Explore different tools and methods, such as BitLooker? and Deduplication, to maximize environment performance Global Settings and their usage to prevent production performance bottlenecks, encrypt network traffic data and control network jurisdiction Restoring from Backup Identify and describe the different restore tools and their features. Ensure you have the confidence to use the correct restore tool at the right time Using Secure Restore to prevent the restoration of malware Disaster recovery from backup, respond accordingly to a variety of real-world recovery scenarios Backup Copy Jobs Simple vs Advanced Backup Copy Jobs, how to create and modify them using best practices to ensure efficient recovery Utilizing tape jobs, how to create and modify Replication Identify and describe the options available for replication, the use cases and impacts of using Create, modify and delete replication jobs, outline considerations to ensure success Failover Identify and describe in detail, failover features and the appropriate usage Develop, prepare and test failover plans to ensure recovery Disaster recovery from replica, respond accordingly to a variety of real-world recovery scenarios Advanced Repository Capabilities Ensure efficiency by being able to select appropriate transport modes while being aware of the impact of various backup functions on the infrastructure Ensure scalability by integrating off-site S3 storage Ensure compatibility with existing deduplication appliances Testing Backup and Replication Testing backups and replicas to ensure you can recover, what you need, when you need to Configure Veeam DataLabs? and setup sandbox environments based on backup, replicas and storage snapshots Using Veeam DataLabs Staged Restore to manage and comply with General Data Protection Regulation (GDPR) legislation before releasing restores to production Veeam Backup Enterprise Manager Manage multiple Veeam Backup & Replication? installations from a single web console, maintaining a view of your entire virtual environment, ensuring data protection of ROBO and Enterprise environments. Create user and group roles, delegate workloads whilst maintaining data control Enable encryption password loss protection, helping to restore encrypted data in case of lost or forgotten encryption passwords Veeam ONE Monitor your Virtual, Physical and Cloud environments with Veeam ONE? and assess the different views available Configure Veeam ONE for your specific technical and business requirements, describe the alarm options available and how to customize their usage Set up, use and customize Veeam ONE Reporter, creating the reports and dashboards you require technically and for the business Support Locate, migrate or restore backup configuration Identify and locate appropriate support resources Troubleshooting methodology to identify, isolate and remediate support issues Additional course details: Nexus Humans VEEAM-VMCE Availability Suite v10.0: Configuration and Management training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VEEAM-VMCE Availability Suite v10.0: Configuration and Management course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Linux Professional Institute Certification (LPIC-2) 201 training is suitable for individuals with roles of: System administrator Network administrator Technician DevOps Overview Upon successful completion of this course, students will be able to: measure hardware resource and network bandwidth, identify and troubleshoot resource problems monitor resource usage to predict future resource needs utilise kernel components that are necessary to specific hardware, hardware drivers, system resources and requirements properly configure a kernel to include or disable specific features of the Linux kernel as necessary manage and/or query a 2.6.x, 3.x or 4.x kernel and its loadable modules query and modify the behaviour of system services at various targets / run levels properly manipulate a Linux system during both the boot process and during recovery mode properly configure and navigate the standard Linux filesystem configure automount filesystems using AutoFS configure and implement software RAID configure kernel options to support various drives create and remove logical volumes, volume groups, and physical volumes use system tools to back up important system data. This course prepares students to take the 201 exam of the LPI level 2 certification. To gain LPIC-2 certification, an individual should have an active LPIC-1 certification. Capacity Planning Measure and Troubleshoot Resource Usage Predict Future Resource Needs Linux Kernel Kernel components Compiling a Linux kernel Kernel runtime management and troubleshooting System Startup Customising system startup System recovery Alternate Bootloaders Filesystem and Devices Filesystem and Devices Maintaining a Linux filesystem Creating and configuring filesystem options Advanced Storage Device Administration Configuring RAID Adjusting Storage Device Access Logical Volume Manager Networking Configuration Basic networking configuration Advanced Network Configuration Troubleshooting network issue System Maintenance Make and install programs from source Backup operations Notify users on system-related issues
Duration 5 Days 30 CPD hours This course is intended for This course is for support staff for AIX on POWER systems Overview After completing this course, you should be able to: - Distinguish Korn and bash shell specific features - Use utilities such as sed and awk to manipulate data - Understand system shell scripts such as /etc/shutdown - Write useful shell scripts to aid system administration This course will teach you how to use shell scripts and utilities for practical system administration of AIX (or other UNIX) operating systems. Basic shell conceptsFlow control in a shell ScriptFunctions and typesetShell features such as arithmetic and string handlingUsing regular expressionsUsing sed, awk and other AIX utilities
The 'Linux Security and Hardening' course focuses on strengthening the security measures of Linux systems. It covers various aspects of security, including general security practices, physical security, account security, network security, and file system security. Learners will gain valuable knowledge and techniques to enhance the security of Linux environments. Learning Outcomes: Understand the importance of Linux security and its significance in protecting systems and data. Implement general security best practices, including updates, patches, and system configurations. Secure physical access to Linux servers and prevent unauthorized access. Manage user accounts and permissions effectively to maintain a secure environment. Apply network security measures, including firewalls, to safeguard against external threats. Set up file system security and encryption to protect sensitive data. Explore additional resources for continuous learning and staying up-to-date with Linux security practices. Why buy this Linux Security and Hardening? Unlimited access to the course for forever Digital Certificate, Transcript, student ID all included in the price Absolutely no hidden fees Directly receive CPD accredited qualifications after course completion Receive one to one assistance on every weekday from professionals Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript on the next working day Easily learn the skills and knowledge from the comfort of your home Certification After studying the course materials of the Linux Security and Hardening there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this course for? This Linux Security and Hardening course is ideal for Students Recent graduates Job Seekers Anyone interested in this topic People already working in the relevant fields and want to polish their knowledge and skill. Prerequisites This Linux Security and Hardening does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Linux Security and Hardening was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path As this course comes with multiple courses included as bonus, you will be able to pursue multiple occupations. This Linux Security and Hardening is a great way for you to gain multiple skills from the comfort of your home. Course Curriculum Unit 01: Course Overview and Downloads Course Overview 00:01:00 Unit 02: General Security Section Overview - General Security 00:01:00 Is Linux Secure? 00:02:00 What Makes Linux Secure? 00:08:00 Security Guidelines and Principles 00:08:00 Section Summary - General Security 00:02:00 Unit 03: Physical Security Section Overview - Physical Security 00:01:00 Physical Security Concepts 00:08:00 Single User Mode Security 00:07:00 Single User Mode and Blank Passwords 00:03:00 Securing the Boot Loader 00:07:00 Disk Encryption 00:06:00 Encrypting a New Device, Part I 00:09:00 Encrypting a New Device, Part II 00:04:00 Encrypting an Existing Device 00:01:00 Disabling Control Alt Delete 00:02:00 Section Summary - Physical Security 00:01:00 Unit 04: Account Security Section Overview - Account Security 00:01:00 Intro to PAM 00:05:00 PAM Configuration Example 00:04:00 Password Security 00:08:00 Account Security Demo #1 (UID 0) 00:03:00 Controlling Account Access 00:05:00 Security by Account Type 00:06:00 Account Security Demo #2 00:03:00 Account Security Demo #3 (Sudo) 00:05:00 Unit 05: Network Security Section Overview - Network Security 00:01:00 Network Security, Part I 00:08:00 Network Security, Part II 00:06:00 Securing SSHD, Part I 00:08:00 Securing SSHD, Part II 00:03:00 Linux Firewall Fundamentals 00:08:00 Configuring the Firewall from the Command Line 00:04:00 Firewall Rule Specifications 00:05:00 Example Firewall Rules 00:04:00 Linux Firewall Demonstration 00:10:00 TCP Wrappers, Part I 00:07:00 TCP Wrappers, Part II 00:04:00 Unit 06: File System Security Section Overview - File System Security 00:01:00 File and Directory Permissions, Intro 00:01:00 File and Directory Permissions, Part I 00:11:00 File and Directory Permissions, Part II 00:09:00 Special Modes, Part I 00:08:00 Special Modes, Part II 00:03:00 File Attributes 00:06:00 File Attributes Demo 00:03:00 ACLs 00:09:00 ACLs Demo 00:06:00 Rootkits 00:09:00 Rootkit Hunter Demonstration 00:07:00 Unit 07: Additional Resources Additional Resources 00:05:00 Assignment Assignment - Linux Security and Hardening 00:00:00
Overview This comprehensive course on Bash Scripting, Linux and Shell Programming will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Bash Scripting, Linux and Shell Programming comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Bash Scripting, Linux and Shell Programming. It is available to all students, of all academic backgrounds. Requirements Our Bash Scripting, Linux and Shell Programming is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 11 sections • 61 lectures • 03:03:00 total length •Introduction: 00:02:00 •Bash vs Shell vs Command Line vs Terminal: 00:06:00 •Listing Folder Contents (ls): 00:05:00 •Print Current Folder (pwd): 00:01:00 •Change Folder (cd): 00:03:00 •Using A Stack To Push Folders (pushd/popd): 00:03:00 •Check File Type (file): 00:01:00 •Find File By Name (locate) & Update Locate Database (updatedb): 00:02:00 •Find A Command (which): 00:02:00 •Show Command History (history): 00:02:00 •Show Manual Descriptions (whatis): 00:01:00 •Search Manual (apropos): 00:02:00 •Reference Manuals (man): 00:02:00 •Creating A Folder (mkdir): 00:02:00 •Creating A File (touch): 00:02:00 •Copy Files/Folders (cp): 00:02:00 •Move & Rename Files/Folders (mv): 00:02:00 •Delete Files/Folders (rm): 00:02:00 •Delete Empty Folder (rmdir): 00:02:00 •Change File Permissions (chmod): 00:06:00 •File Concatenation (cat): 00:03:00 •File Perusal Filter (more/less): 00:02:00 •Terminal Based Text Editor (nano): 00:03:00 •Run Commands As A Superuser (sudo): 00:03:00 •Change User (su): 00:03:00 •Show Effecter User and Group IDs (id): 00:02:00 •Kill A Running Command (ctrl + c): 00:02:00 •Kill All Processes By A Name (killall): 00:02:00 •Logging Out Of Bash (exit): 00:01:00 •Tell Bash That There Is No More Input (ctrl + d): 00:02:00 •Clear The Screen (ctr + l): 00:02:00 •Zoom In (ctrl + +): 00:02:00 •Zoom Out (ctrl + -): 00:02:00 •Moving The Cursor: 00:02:00 •Deleting Text: 00:04:00 •Fixing Typos: 00:03:00 •Cutting and Pasting: 00:03:00 •Character Capitalisation: 00:03:00 •Bash File Structure: 00:03:00 •Echo Command: 00:04:00 •Comments: 00:04:00 •Variables: 00:06:00 •Strings: 00:06:00 •While Loop: 00:04:00 •For Loop: 00:04:00 •Until Loop: 00:03:00 •Break & Continue: 00:03:00 •Get User Input: 00:02:00 •If Statement: 00:09:00 •Case Statements: 00:06:00 •Get Arguments From The Command Line: 00:04:00 •Functions: 00:05:00 •Global vs Local Variables: 00:03:00 •Arrays: 00:06:00 •Shell & Environment Variables: 00:06:00 •Scheduled Automation: 00:03:00 •Aliases: 00:03:00 •Wildcards: 00:03:00 •Multiple Commands: 00:02:00 •Resource: 00:00:00 •Assignment - Bash Scripting, Linux and Shell Programming@@: 00:00:00
Duration 5 Days 30 CPD hours This course is intended for IT professionals across a broad range of disciplines who need to perform essential Linux administration tasks including installation, establishing network connectivity, managing physical storage, and basic security administration. This course relates to Red Hat Enterprise Linux 7 and is designed for IT pros without previous Linux admin experience. The course focuses on providing students with Linux admin 'survival skills' by focusing on core admin tasks. Access the command line Log in to a Linux system and run simple commands using the shell. Manage files from the command line Copy, move, create, delete, and organize files from the bash shell prompt. Getting help in Red Hat Enterprise Linux Resolve problems by using online help systems and Red Hat support utilities. Create, view, and edit text files Create, view, and edit text files from command output or in an editor Manage local Linux users and groups Manage local Linux users and groups, and administer local password policies. Control access to files with Linux file system permissions Set Linux file system permissions on files and interpret the security effects of different permission settings. Monitor and manage Linux processes Obtain information about the system, and control processes running on it. Control services and daemons Control and monitor network services and system daemons using systemd. Configure and secure OpenSSH service Access and provide access to the command line on remote systems securely using OpenSSH. Analyze and store logs Locate and accurately interpret relevant system log files for troubleshooting purposes. Manage Red Hat Enterprise Linux networking Configure basic IPv4 networking on Red Hat Enterprise Linux systems. Archive and copy files between systems Archive files and copy them from one system to another. Install and update software packages Download, install, update, and manage software packages from Red Hat and yum package repositories. Access Linux file systems Access and inspect existing file systems on a Red Hat Enterprise Linux system. Use virtualized systems Create and use Red Hat Enterprise Linux virtual machines with KVM and libvirt.
Duration 5 Days 30 CPD hours This course is intended for This course is geared toward Windows system administrators, network administrators, and other system administrators who are interested in supplementing current skills or backstopping other team members, in addition to Linux system administrators who are responsible for these tasks: Configuring, installing, upgrading, and maintaining Linux systems using established standards and procedures, Providing operational support, Managing systems for monitoring system performance and availability, Writing and deploying scripts for task automation and system administration. Overview #NAME? Red Hat System Administration I (RH124) equips you with Linux© administration "survival skills" by focusing on foundational Linux concepts and core tasks. You will learn how to apply command-line concepts and enterprise-level tools, starting you on your journey toward becoming a full-time Linux system administrator. This path continues with the follow-on course, Red Hat System Administration II (RH134). 1 - Getting Started with the GNOME Graphical Desktop Get started with GNOME and edit text files with gedit 2 - Manage Files Graphically with Nautilus Manage files graphically and access remote systems with Nautilus 3 - Get Help in a Graphical Environment Access documentation, both locally and online 4 - Configure Local Services Configure the date and time and configure a printer 5 - Manage Physical Storage Understand basic disk concepts and manage system disks 6 - Manage Logical Volumes Understand logical volume concepts and manage logical volumes 7 - Monitor System Resources Manage memory and CPU utilization 8 - Manage System Software Manage system software locally and using Red Hat Network (RHN) 9 - Get Started with Bash Understand basic shell concepts, execute simple commands, and use basic job control techniques 10 - Get Help in a Textual Environment Use man and info pages and find documentation in /usr/share/doc 11 - Establish Network Connectivity Understand basic network concepts; configure, manage, and test network settings 12 - Administer Users and Groups Manage users and groups 13 - Manage Files from the Command Line Understand Linux filesystem hierarchy; manage files from the command line 14 - Secure Linux File Access Understand Linux file access mechanisms; manage file access from the GUI and the command line 15 - Administer Remote Systems Share and connect to a desktop; use SSH and rsync 16 - Configure General Services Manage services; configure SSH and remote desktops 17 - Manage Physical Storage II Manage filesystem attributes and swap space 18 - Install Linux Graphically Install Red Hat Enterprise Linux and configure the system with firstboot 19 - Manage Virtual Machines Understand basic virtualization concepts; install and manage virtual machines 20 - Control the Boot Process Understand runlevels and manage GRUB 21 - Deploy File Sharing Services Deploy an FTP server and a web server 22 - Secure Network Services Manage a firewall; understand SELinux concepts and manage SELinux 23 - Comprehensive Review Get a hands-on review of the concepts covered throughout the course
Duration 5 Days 30 CPD hours This course is intended for System administrator Network administrator Technician DevOps Overview The Linux Professional Institute(LPI) is the go to certification body for vendor independent Linux certifications. This course covers fundamental Linuxskills such as file management and manipulation, text processing, command line use, package management,filesystems, hardware, and many more. Students will feel confident taking the LPI LPIC-1 101 exam with in classroomassessments and practice exams. This course prepares students to take the 101 exam of the LPI level 1 certification. Work on the Command Line LPI Objectives Covered Role of Command Shell Shells Gathering System Info Identifying the Shell Changing the Shell Shell Prompts Bash: Bourne-Again Shell Navigating the Filesystem Help from Commands and Documentation Getting Help Within the Graphical Desktop Getting Help with man & info Bash: Command Line History Bash: Command Editing Bash: Command Completion Shell and Environment Variables Key Environment Variables LAB TASKS Use Streams, Pipes, and Redirects LPI Objectives Covered File Redirection Piping Commands Together Filename Matching File Globbing and Wildcard Patterns Brace Expansion General Quoting Rules Nesting Commands Gotchas: Maximum Command Length LAB TASKS Manage File Permissions and Ownership LPI Objectives Covered Filesystem Hierarchy Standard Displaying Directory Contents Filesystem Structures Determining Disk Usage With df and du File Ownership Default Group Ownership File and Directory Permissions File Creation Permissions with umask Changing File Permissions SUID and SGID on files SGID and Sticky Bit on Directories User Private Group Scheme LAB TASKS Create, Delete, Find, and Display Files LPI Objectives Covered Directory Manipulation File Manipulation Deleting and Creating Files Physical Unix File Structure Filesystem Links File Extensions and Content Which and Type Where is Searching the Filesystem Alternate Search Method Manually Installed Shared Libraries LAB TASKS Work with Archives and Compression LPI Objectives Covered Archives with tar Archives with cpio The gzip Compression Utility The bzip2 Compression Utility The XZ Compression Utility The PKZIP Archiving/Compression format LAB TASKS Process Text Streams Using Filters LPI Objectives Covered Producing File Statistics The Streaming Editor Replacing Text Characters Text Sorting Duplicate Removal Utility Extracting Columns of Text Displaying Files Prepare Text for Display Previewing Files Displaying Binary Files Combining Files and Merging Text LAB TASKS Search Text Files Using Regular Expressions LPI Objectives Covered Searching Inside Files Regular Expression Overview Regular Expressions RE Character Classes Regex Quantifiers RE Parenthesis LAB TASKS Perform Basic File Editing Operations Using VI LPI Objectives Covered Text Editing vi and Vim Learning Vim Basic vi Intermediate vi LAB TASKS Create, Monitor, and Kill Processes LPI Objectives Covered What is a Process? Process Lifecycle Process States Viewing Processes Signals Tools to Send Signals Managing Processes Tuning Process Scheduling Job Control Overview Job Control Commands Nohup and Disown Uptime & w Persistent Shell Sessions with Screen Using screen Advanced Screen LAB TASKS Use RPM, YUM, and Debian Package Management LPI Objectives Covered Managing Software RPM Architecture Working With RPMs Querying and Verifying with RPM Installing Debian Packages Querying and Verifying with dpkg The alien Package Conversion Tool Managing Software Dependencies Using the Yum command yum downloader Configuring Yum The deselect & APT Frontends to dpkg Aptitude Configuring APT LAB TASKS Work with Partitions, Filesystem, and Disk Quotas LPI Objectives Covered Partition Considerations Logical Volume Management Filesystem Planning Partitioning Disks with fdisk & gdisk Resizing a GPT Partition with gdisk Partitioning Disks with parted Non-Interactive Disk Partitioning with sfdisk Filesystem Creation Filesystem Support Unix/Linux Filesystem Features Swap Selecting a Filesystem Filesystem Maintenance Mounting Filesystems Mounting Filesystems Managing an XFS Filesystem NFS SMB Filesystem Table (/etc/fstab) Configuring Disk Quotas Setting Quotas Viewing and Monitoring Quotas LAB TASKS Linux Boot Process LPI Objectives Covered Booting Linux on PCs GRUB 2 GRUB 2 Configuration GRUB Legacy Configuration Boot Parameters Uinit Linux Runlevels Aliases Systemd local-fs.target and sysinit.target Runlevel Implementation System Boot Method Overview Systemd System and Service Manager Modifying systemd services Systemd Targets Using systemd Shutdown and Reboot System Messaging Commands Controlling System Messaging LAB TASKS Determine and Configure Hardware Settings LPI Objectives Covered Managing Linux Device Files Hardware Discovery Tools Configuring New Hardware with hwinfo PC Architecture and Bus DMA & IRQ USB Devices USB Architecture Configuring Kernel Components and Modules Kernel Modules Handling Module Dependencies Configuring the Kernel via /proc/ LAB TASKS Linux Fundamentals Unix and its Design Principles FSF and GNU GPL Æ?? General Public License The Linux Kernel Components of a Distribution Red Hat Linux Products SUSE Linux Products Debian Ubuntu Logging In got root? Switching User Contexts Gathering Login Session Info LAB TASKS Additional course details: Nexus Humans Linux Professional Institute Certification (LPIC) 101 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Linux Professional Institute Certification (LPIC) 101 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.