The Top Linux Administration Course Start Your Career In IT
What you’ll learn
By the end of this course you will be a professional in Linux administration and be able to apply for Linux jobs
You will have solid Linux skills and have great understanding of Linux concepts and fundamentals
You will master all of the important Linux commands
Acquire the technical expertise to work on the Linux command line
You will be able to troubleshoot day-to-day Linux related issues
You will gain advance Linux systems administration skills
You will gain knowledge of the most used Linux commands
Become an Independent User of the Linux Operating System
Feel comfortable using the command line interface
CentOS/Redhat versions 7, 8 and 9 and Rocky 8 and 9
Requirements
This course covers all about Linux from square one, so no prior knowledge is required
A desire to pursue your objectives and goals
A computer (Windows, Mac, or Linux) with an Internet connection
Description
WELCOME ! Welcome to the Top Linux Administration Course, the one course you need to learn all about Linux Administration, Linux Command Line and Linux in general to start your career in IT.The Linux operating system is the most preferred operating system in the corporate world and the great thing about Linux is that most of what you’ll need to learn isn’t very difficult at all. Linux is a key skill of IT, it provides good career opportunities with higher salaries, it’s a free operating system and by learning Linux, you can use this Linux knowledge and apply it to roles like Linux System Administrator, DevOps Engineer, Cloud Architect, Network Administrator, Security Engineer, Backend Developer, Frontend Developer, Data Scientist, and much more. So if you want to learn Linux and be able to apply it in any of the roles mentioned above, then this course is for you ! Course’s Aim ?This course will teach you the Linux skills that will enable you to start your career in IT in any Linux based or related job and to provide you with all you need to apply for the job as a professional in Linux. After this course you won’t be needing any other to start your career and that’s because this course is designed to cover all the Linux aspects needed for you to start your career in IT. Who are we?We are M Torkey and M Khalil and we have been working with Linux for over a decade, along the years we’ve worked in so many companies as Sys Admins and DevOps Engineers and we have been given the opportunity to learn from experts and developed a lot of skills in the work field and henceforth we would present for you what you exactly need to skyrocket your chances of landing a job in IT and starting your career. In this course you’ll learn the key commands, concepts and overall Linux skills that will help get you started in your journey.Why Linux ?Linux tends to be highly reliable and a more secure system than any other operating system (OS). Linux also is quite popular among many corporates and many consider it to be the lead operating system in the corporate world. Here are 5 reasons why you should start in Linux:Linux Provides Good Career OpportunitiesMuch of the infrastructure that powers the internet, including routers and servers, is based on LinuxIt’s Used on Nearly Every ServerLinux is one such skill that allows an individual to experience a widespread growth in their profile after learning itLinux is free and open sourceWhat will be presented in this course ?The course is aimed to teach Linux to beginners, intermediates and even advanced Linux users who wish to develop their skills in Linux. Starting all the way from the Linux basics up to how to manage an entire platform. This is the list of topics that I will cover in this course: Section 1 – Introduction Welcome !What is Linux ?Why Linux ?Section 2 – Prepare Your LabInstall VirtualBox on WindowsCreate our first virtual machineAdd New Virtual Hard DiskWhy Rocky Linux ? and it’s relation to centOS and RedHatInstall Rocky 9.0 (Redhat & CentOS compatible)Port Forwarding – NAT – Network issue solutionSection 3 – Understand & Use Essential ToolsAccessing the Command LineLinux File System HierarchyCreate Files & DirectoriesFind Your Way In LinuxCopy, Move, Rename & Delete FilesCopy, Move, Rename & Delete DirectoriesGet Help with Manual PagesGet Help with PinfoRead Linux DocumentationUse Input & Output redirectionCreate & Edit Text FilesAccess Remote Systems Using SSHArchive, Compress, Unpack & Uncompress FilesCreate Hard & Soft LinksFinding FilesSection 4 – Linux System Administration (Chapter 1)Create Local Users & Local GroupsGain Super PowersModify Users, Groups & Password AgingConfigure A System To Use An Existing Authentication ServiceNotation PermissionsSymbolic PermissionsSpecial PermissionsSection 5 – Linux System Administration (Chapter 2)Monitor Running Processes with ps CommandRun Processes in the BackgroundTerminate Running Processes with Kill & PkillMonitoring Running System with topListing Unit Files with systemctlStart, Stop & Check The status of a Linux ServiceThe Truth About System LogThe rsyslogThe SystemD JournalBoot, Reboot And Shut Down A System NormallyBoot Systems Into Different Targets ManuallyInterrupt The Boot Process To Gain Access To A SystemAdjust Process Priority With ReniceSection 6 – Linux System Administration (Chapter 3)Examining the File SystemMounting & Unmounting File SystemCreate, Mount, Unmount And Use Vfat, ext4 And xfs File SystemsMount and Unmount CIFS and NFS Network File SystemsExtend Existing Logical VolumeCreate and manage Access Control Lists ACLsMaintain Accurate Time with ntpValidate Your Network ConfigurationConfigure Linux NetworkEdit Network Configuration FilesConfiguring Hostnames & Names ResolutionInstall & Update Software with yumManage RPM PackagesSchedule Tasks Using at and cronSection 7 – Linux System Administration (Chapter 4)Configure Key-Based Authentication for SSHDisallow User Root from Logging In Using SSHCopying Files Securely Between SystemsSynchronize Files & Folders Securely Between SystemsConfigure Firewall Settings Using Firewall-config & Firewall-cmdIntroduction To SElinuxList And Identify SElinux File And Process ContextRestore Default File ContextsUse Boolean Settings To Modify System SElinuxDiagnose And Address Routine SElinux Policy ViolationSection 8 – Linux System Administration (Chapter 5)Configure Aggregated Network Links Between 2 RHEL Systems or InterfacesConfigure IPv6 Addresses and Perform Basic IPv6 TroubleshootingFirewalld – The rich rulesConfigure Network Address Translation(NAT) – MasqueradeConfigure Network Address Translation (NAT) – Port forwardingConfigure a system as an iSCSI targetConfigure a system as an iSCSI initiatorUse procsys and sysctl to Modify or Set Kernel runtime parametersProduce and deliver reports on system utilization(processor,memory,disk,network)Section 9 – Linux System Administration (Advanced Topics)Install the packages needed to provide the serviceConfigure SELinux to support the serviceUse SELinux port labelling to allow services to use non-standard portsConfigure the service to start when the system is bootedInstall and Configure ApacheConfigure Apache access restrictions on directoriesConfigure Group Managed ContentDeploy a basic CGI applicationConfigure an Apache Virtual HostConfigure TLS securityThe Apache Configuration FileConfigure a Caching-Only Name ServerProvide network shares to specific clientsProvide network shares suitable for group collaborationUse Kerberos to Control Access to NFS network shares (configure Kerberos)Use Kerberos to Control Access to NFS network shares ( Configure Nfs Server )Provide Network Shares to Specific Clients-client installation and configurationProvide Network Shares Suitable for Group CollaborationConfigure a system to forward all emails to a central mail serverConfigure Key-Based AuthenticationConfigure Key-Based Authentication 2Synchronize time using other NTP peersInstall and Configure MariaDBCreate a simple database schemaBackup databasePerform simple SQL queries against a databaseRestore a MariaDB databaseSection 10 – Bonus 1: Secure Shell Deep DiveIntroduction To Secure ShellHow do I connect to a remote hostHow do I connect to a remote host on a different SSH portHow can I login to a specific directory?How do I execute a command on a remote host using SSH?How can I copy (file/files) to a remote host using SCP?How can I copy (file/files) from a remote host using SCP?How can I Copy entire directory using SCP?Can I limit the speed (bandwidth) of files transfer using SCP?What is SFTP and how to connect to SFTP?SFTP List file and check the working directorySFTP Uploading FilesSFTP Downloading FilesSFTP Switching and Creating DirectoriesSFTP Remove Files and DirectoriesMultiple SSH Sessions with screen (Install Screen)Multiple SSH Sessions with screen (Start working)Multiple SSH Sessions with screen Lock and Exit from the screenTunneling x11 Through SSH (Linux)Tunneling x11 Through SSH (Run Linux Applications on Windows)Remote Desktop with SSH (Install and Configure VNC Server)Remote Desktop with SSH (Connect to Remote Desktop)Change The Default PortDisable Direct Root AccessAllow Access for Certain User(s)Deny Access from Known IPsAllow Access from Known IPsPublic Key AuthenticationDisable Password AuthenticationSection 11 – Bonus 2: Additional LecturesVi editor part 1Vi editor part 2Create SWAP file and SWAP partitionLogical Volume Management (LVM)Software RAIDProcess ManagmentVMSTAT And IOSTATList Open Files (LSOF)TcpdumpSearch for Files on Linux using find and locateCat CommandGrep CommandAWK CommandHEAD CommandNetwork Clients (ssh , Scp , Ftp ,wget)With that there will be 24 hour support for any questions or suggestions in the discussion forum And now after this description you must be concerned on what are you going to get out of this course by the end ! By the end of this course you will have the skills that will qualify you to apply for any Linux related job and be able to preform in real life situations. ==========================================================================================For Assurance, check out what my students actually have to say about the course:”I’ve taken dozens of courses on Udemy with some really great content, but this if you only take one course, this is the one to take. thank you.!!!” – Edward W. (5 Star Review)”Five Star All The Way!!! Thanks guys you are the best on Udemy! Well explained course and easy to understand in a reasonable time. After completing the first section I am confident that this course will provide everything I had hoped for and more” – canning G. (5 Star Review)”Thank you very much for the course! I look forward to seeing more lectures, he did not waste a word. Buy this course if you want to succeed. Very understandable!!!” – Kaichekanchap (5 Star Review) “Awesome dude!! great stuff, highly recommend. Simply Five Star. Thank you for showing us this innovative knowledge. It was extremely well educative” – Uppalakiran (5 Star Review)”Simple and straightforward!!!!!! Wish I’d had access to a class like this years ago. The instructor are always here to help out, never had a problem to contact him regarding to the question in the course” – Sairepavan (5 Star Review)”I have got more information about Linux, I would strongly recommend this course to all new professionals starting their career as a Linux administrator” – Abhishek Kumar P. (5 Star Review)”Great job!!! Best course on udemy. Simple and sweet description. Anyone who want to learn linux can go through it. It gave me exactly what I was looking for” – Nervinara (5 Star Review)
Overview
Section 1: Introduction
Lecture 1 Welcome !
Lecture 2 What is Linux ?
Lecture 3 Why Linux ?
Section 2: Prepare Your Lab
Lecture 4 Install VirtualBox on Windows
Lecture 5 Create our first virtual machine
Lecture 6 Add New Virtual Hard Disk
Lecture 7 Why Rocky Linux ? and it’s relation to centOS and RedHat
Lecture 8 Install Rocky 9.0 (Redhat & CentOS compatible)
Lecture 9 Port Forwarding – NAT – Network issue solution
Section 3: Understand & Use Essential Tools
Lecture 10 Accessing the Command Line
Lecture 11 Linux File System Hierarchy
Lecture 12 Create Files & Directories
Lecture 13 Find Your Way In Linux
Lecture 14 Copy, Move, Rename & Delete Files
Lecture 15 Copy, Move, Rename & Delete Directories
Lecture 16 Get Help with Manual Pages
Lecture 17 Get Help with Pinfo
Lecture 18 Read Linux Documentation
Lecture 19 Use Input & Output redirection
Lecture 20 Create & Edit Text Files
Lecture 21 Access Remote Systems Using SSH
Lecture 22 Archive, Compress, Unpack & Uncompress Files
Lecture 23 Create Hard & Soft Links
Lecture 24 Finding Files
Section 4: Linux System Administration (Chapter 1)
Lecture 25 Create Local Users & Local Groups
Lecture 26 Gain Super Powers
Lecture 27 Modify Users, Groups & Password Aging
Lecture 28 Configure A System To Use An Existing Authentication Service
Lecture 29 Notation Permissions
Lecture 30 Symbolic Permissions
Lecture 31 Special Permissions
Section 5: Linux System Administration (Chapter 2)
Lecture 32 Monitor Running Processes with ps Command
Lecture 33 Run Processes in the Background
Lecture 34 Terminate Running Processes with Kill & Pkill
Lecture 35 Monitoring Running System with top
Lecture 36 Listing Unit Files with systemctl
Lecture 37 Start, Stop & Check The status of a Linux Service
Lecture 38 The Truth About System Log
Lecture 39 The rsyslog
Lecture 40 The SystemD Journal
Lecture 41 SystemD Journal Preservation
Lecture 42 Boot, Reboot And Shut Down A System Normally
Lecture 43 Boot Systems Into Different Targets Manually
Lecture 44 Interrupt The Boot Process To Gain Access To A System
Lecture 45 Adjust Process Priority With Renice
Section 6: Linux System Administration (Chapter 3)
Lecture 46 Examining the File System
Lecture 47 Mounting & Unmounting File System
Lecture 48 Create, Mount, Unmount And Use Vfat, ext4 And xfs File Systems
Lecture 49 Mount and Unmount CIFS and NFS Network File Systems
Lecture 50 Extend Existing Logical Volume
Lecture 51 Create and manage Access Control Lists ACLs
Lecture 52 Maintain Accurate Time with ntp
Lecture 53 Validate Your Network Configuration
Lecture 54 Configure Linux Network
Lecture 55 Edit Network Configuration Files
Lecture 56 Configuring Hostnames & Names Resolution
Lecture 57 Install & Update Software with yum
Lecture 58 Manage RPM Packages
Lecture 59 Schedule Tasks Using at and cron
Section 7: Linux System Administration (Chapter 4)
Lecture 60 Configure Key-Based Authentication for SSH
Lecture 61 Disallow User Root from Logging In Using SSH
Lecture 62 Copying Files Securely Between Systems
Lecture 63 Synchronize Files & Folders Securely Between Systems
Lecture 64 Configure Firewall Settings Using Firewall-config & Firewall-cmd
Lecture 65 Introduction To SElinux
Lecture 66 List And Identify SElinux File And Process Context
Lecture 67 Restore Default File Contexts
Lecture 68 Use Boolean Settings To Modify System SElinux
Lecture 69 Diagnose And Address Routine SElinux Policy Violation
Section 8: Linux System Administration (Chapter 5)
Lecture 70 Configure Aggregated Network Links Between 2 RHEL Systems or Interfaces
Lecture 71 Configure IPv6 Addresses and Perform Basic IPv6 Troubleshooting
Lecture 72 Firewalld – The rich rules
Lecture 73 Configure Network Address Translation(NAT) – Masquerade
Lecture 74 Configure Network Address Translation (NAT) – Port forwarding
Lecture 75 Configure a system as an iSCSI target
Lecture 76 Configure a system as an iSCSI initiator
Lecture 77 Use procsys and sysctl to Modify or Set Kernel runtime parameters
Lecture 78 Produce and deliver reports on system utilization(processor,memory,disk,network)
Section 9: Linux System Administration (Advanced Topics)
Lecture 79 Install the packages needed to provide the service
Lecture 80 Configure SELinux to support the service
Lecture 81 Use SELinux port labelling to allow services to use non-standard ports
Lecture 82 Configure the service to start when the system is booted
Lecture 83 Install and Configure Apache
Lecture 84 Configure Apache access restrictions on directories
Lecture 85 Configure Group Managed Content
Lecture 86 Deploy a basic CGI application
Lecture 87 Configure an Apache Virtual Host
Lecture 88 Configure TLS security
Lecture 89 The Apache Configuration File
Lecture 90 Configure a Caching-Only Name Server
Lecture 91 Provide network shares to specific clients
Lecture 92 Provide network shares suitable for group collaboration
Lecture 93 Use Kerberos to Control Access to NFS network shares (configure Kerberos)
Lecture 94 Use Kerberos to Control Access to NFS network shares ( Configure Nfs Server )
Lecture 95 Provide Network Shares to Specific Clients-client installation and configuration
Lecture 96 Provide Network Shares Suitable for Group Collaboration
Lecture 97 Configure a system to forward all emails to a central mail server
Lecture 98 Configure Key-Based Authentication
Lecture 99 Configure Key-Based Authentication 2
Lecture 100 Synchronize time using other NTP peers
Lecture 101 Install and Configure MariaDB
Lecture 102 Create a simple database schema
Lecture 103 Backup database
Lecture 104 Perform simple SQL queries against a database
Lecture 105 Restore a MariaDB database
Section 10: Cover Letter & CV Structure
Lecture 106 How to write a cover letter
Lecture 107 CV Structure
Section 11: Bonus 1: Secure Shell Deep Dive
Lecture 108 Introduction To Secure Shell
Lecture 109 How do I connect to a remote host
Lecture 110 How do I connect to a remote host on a different SSH port
Lecture 111 How can I login to a specific directory?
Lecture 112 How do I execute a command on a remote host using SSH?
Lecture 113 How can I copy (file/files) to a remote host using SCP?
Lecture 114 How can I copy (file/files) from a remote host using SCP?
Lecture 115 How can I Copy entire directory using SCP?
Lecture 116 Can I limit the speed (bandwidth) of files transfer using SCP?
Lecture 117 What is SFTP and how to connect to SFTP?
Lecture 118 SFTP List file and check the working directory
Lecture 119 SFTP Uploading Files
Lecture 120 SFTP Downloading Files
Lecture 121 SFTP Switching and Creating Directories
Lecture 122 SFTP Remove Files and Directories
Lecture 123 Multiple SSH Sessions with screen (Install Screen)
Lecture 124 Multiple SSH Sessions with screen (Start working)
Lecture 125 Multiple SSH Sessions with screen Lock and Exit from the screen
Lecture 126 Tunneling x11 Through SSH (Linux)
Lecture 127 Tunneling x11 Through SSH (Run Linux Applications on Windows)
Lecture 128 Remote Desktop with SSH (Install and Configure VNC Server)
Lecture 129 Remote Desktop with SSH (Connect to Remote Desktop)
Lecture 130 Change The Default Port
Lecture 131 Disable Direct Root Access
Lecture 132 Allow Access for Certain User(s)
Lecture 133 Deny Access from Known IPs
Lecture 134 Allow Access from Known IPs
Lecture 135 Public Key Authentication
Lecture 136 Disable Password Authentication
Section 12: Bonus 2: Additional Lectures
Lecture 137 Vi editor part 1
Lecture 138 Vi editor part 2
Lecture 139 Create SWAP file and SWAP partition
Lecture 140 Logical Volume Management (LVM)
Lecture 141 Software RAID
Lecture 142 Process Managment
Lecture 143 VMSTAT And IOSTAT
Lecture 144 List Open Files (LSOF)
Lecture 145 Tcpdump
Lecture 146 Search for Files on Linux using find and locate
Lecture 147 Cat Command
Lecture 148 Grep Command
Lecture 149 AWK Command
Lecture 150 HEAD Command
Lecture 151 Network Clients (ssh , Scp , Ftp ,wget)
Anyone who would like to learn Linux and seek a job in Linux.,Anyone interested in starting a career in Linux,Anyone who wants to learn how to use the Linux command line and master the skill,Anyone who wants to become a Linux system administrator
Course Information:
Udemy | English | 21h 49m | 5.81 GB
Created by: M Torkey
You Can See More Courses in the IT & Software >> Greetings from CourseDown.com