- Relationship to LFS101x
- Using as LFCS Exam Preparation
- Course Formatting
- Read the Documentation
- Target Platform
- Command Line vs Graphical Interface
- Target Linux Distributions
- Installation: What to Use for this Course
- Course Timing
- Lab Exercises
- Change, Repetition, and Holy Wars
- The Linux Foundation
- Linux Foundation Training
- Labs
Fundamentals of Linux Administration Certification Training
Learn the In-demand Linux Administration Skills to Grow Your Career!
40 hours | Self-paced training | 12 months access
Course Price: $2,995
Skills you will learn

Learn commands for installation, searches and manipulating files in a Linux environment.

Learn how to manage boot processes and security, schedule jobs, update system, monitor system performance.

Understand users and groups management. Add, delete, modify or configure LDAP and PAM.

Learn how to maintain network performance.

Get hands-on experience for DNS, Shares, SSH and SELinux/AppArmor configuration and setup servers for DHCP and HTTP.

Build expertise on system management by using partitions, logical and physical volumes, ACLs, quotas and clustering.
Companies recruiting Linux Certified professionals:

About the Training
The 40 hours self-paced online bootcamp is designed for professional who wishes to become a Linux Administrator. The course outline covers the administration and configuration of Linux families: Red Hat, SUSE, Debian or Ubuntu. Upon training completion, the students will be awarded a free practice exam and certificate of completion from Wagner College.
Prerequisites:
People who have little or no prior experience with Linux or Unix. System administrators, developers, architects, decision-makers or new Linux users can all benefit from the content covered in this class, especially if they are looking to work with more involved topics such as Linux system administration, network management and enterprise system architecture.
HOW MUCH DOES A LINUX CERTIFIED PROFESSIONAL MAKE?
- Senior Systems Administrator | $100,000
- Systems Engineer, IT | $85,000
- Linux Systems Administrator | $78,000
Course Outline
- Understanding the Boot Sequence
- BIOS
- Boot Loaders
- Configuration Files in /etc
- /etc/sysconfig
- /etc/default
- Shutting Down and Rebooting
- Labs
- What is GRUB?
- Interactive Selections with GRUB at Boot
- Installing GRUB
- GRUB Device Nomenclature
- Customizing the GRUB Configuration File
- Labs
- The init Process
- Startup Alternatives
- SysVinit Runlevels
- SysVinit and /etc/inittab
- SysVinit Startup Scripts
- chkconfig
- service
- chkconfig and service on Debian-based Systems
- Upstart
- Upstart Utilities
- systemd
- systemd Configuration Files
- Systemctl
- Labs
- One Big File system
- Data Distinctions
- FHS Linux Standard Directory Tree
- Main Directory Layout
- The root (/) Directory and Filesystem
- /bin
- /root
- Other Files and Directories in /boot
- /dev
- /etc
- /home
- /lib
- /media
- /mnt
- /opt
- /proc
- /sys
- /root
- /sbin
- /tmp
- /usr
- /var
- /run
- Labs
- Advantages of Kernel Modules
- Module Utilities
- Module Loading and Unloading
- modprobe
- Some Considerations with Modules
- modinfo
- Module Parameters
- Kernel Module Configuration
- Labs
- Device Nodes
- Major and Minor Numbers
- udev
- udev Components
- udev and Hotplug
- udev Rule Files
- Creating udev Rules
- Some Examples of Rules Files
- Labs
- Common Disk Types
- Disk Geometry
- Partitioning
- Why partition?
- Partition Table
- Naming Disk Devices and Nodes
- More on SCSI Device Names
- blkid and lsblk
- Sizing up partitions
- Backing up and Restoring Partition Tables
- Partition table editors
- Using fdisk
- Labs
- Why Use Encryption?
- LUKS
- cryptsetup
- Using an Encrypted Partition
- Mounting at Boot
- Labs
- Filesystem Basics
- Filesystem Tree Organization
- Virtual File System (VFS)
- Available Filesystems
- Journalling Filesystems
- Current Filesystem Types
- Special Filesystems
- Labs
- Inodes
- Directory Files
- Extended Attributes and lsattr/chattr
- Creating and Formatting Filesystems
- Checking and Fixing Filesystems
- Mounting and Unmounting Filesystems
- mount
- mount Options
- umount
- Mounting Filesystems at Boot
- Listing Currently Mounted Filesystems
- Labs
- Swap
- Quotas
- Setting up Quotas
- quotacheck
- Turning quotas on and off
- Examining Quotas
- Setting quotas
- Filesystem Usage
- Disk Space Usage
- Labs
- Ext4 History and Basics
- Ext4 Features
- Ext4 Layout
- Block Groups
- dumpe2fs
- tune2fs
- Superblock Information
- Data Blocks and Inodes
- Ext4 Filesystem Enhancements
- Labs
- XFS Features
- XFS Filesystem Maintenance
- The btrfs Filesystem
- Labs
- LVM
- LVM and RAID
- Volumes and Volume Groups
- Logical Volumes Utilities
- Creating Logical Volumes
- Displaying Logical Volumes
- Resizing Logical Volumes
- Examples of Resizing
- LVM Snapshots
- Labs
- RAID
- RAID Levels
- Software RAID Configuration
- Monitoring RAIDs
- RAID Hot Spares
- Labs
- Local System Security
- Creating a Security Policy
- What to Include in the Policy
- What Risks to Assess
- Choosing a Security Philosophy
- Some General Security Guidelines
- Updates and Security
- Hardware Accessibility and Vulnerability
- Hardware Access Guidelines
- Protection of BIOS
- Protecting the Boot Loader with Passwords
- Filesystem Security: mount Options
- setuid and setgid
- Setting the setuid/setgid Bits
- Labs
- What are Linux Security Modules?
- LSM Choices
- SELinux Overview
- SELinux Modes
- SELinux Policies
- Context Utilities
- SELinux and Standard Command Line Tools
- SELinux Context Inheritance and Preservation
- restorecon
- semanage fcontext
- Using SELinux Booleans
- getsebool and setsebool
- Troubleshooting Tools
- Additional Online Resources
- AppArmor
- Labs
- Processes, Programs and Threads
- The init Process
- Processes
- Process Attributes
- Controlling Processes with ulimit
- Process Permissions and setuid
- Process States
- Execution Modes
- User Mode
- System Mode
- Daemons
- Kernel-Created Processes
- Process Creating and Forking
- Creating Processes in a Command Shell
- Using nice to Set Priorities
- Modifying the Nice Value
- Labs
- What are Signals?
- Types of Signals
- kill
- killall and pkill
- Labs
- Available Monitoring Tools
- The /proc and /sys Pseudo-filesystems
- /proc Basics
- A Survey of /proc
- /proc/sys
- /sys Basics
- A Survey of /sys
- sar
- Labs
- Monitoring Tools
- Viewing Process States with ps
- BSD Option Format for ps
- ps Output Fields
- UNIX Option Format for ps
- Customizing the ps Output
- Using pstree
- Viewing System Loads with top
- top Options
- Labs
- Disk Bottlenecks
- iostat
- iostat Options
- iostat Extended Options
- iotop
- Using ionice to Set I/O Priorities
- Labs
- I/O Scheduling
- I/O Scheduler Choices
- I/O Scheduling and SSD Devices
- Tunables and Switching The I/O Scheduler at Run Time
- CFQ (Completely Fair Queue Scheduler)
- CFQ Tunables
- Deadline Scheduler
- Deadline Tunables
- Labs
- Memory Tuning Considerations
- Memory Monitoring Tools
- /proc/sys/vm
- vmstat
- /proc/meminfo
- OOM Killer
- Labs
- Software Packaging Concepts
- Why Use Packages?
- Packages Types
- Available Package Management Systems
- Packaging Tool Levels and Varieties
- Package Sources
- Creating Software Packages
- Labs
- RPM
- Advantages of Using RPM
- Package File Names
- Database Directory
- Helper Programs and Modifying Settings
- Queries
- Verifying Packages
- Installing Packages
- Uninstalling Packages
- Upgrading Packages
- Freshening Packages
- Upgrading the Kernel
- Using rpm2cpio
- Labs
- DPKG Essentials
- Package File Names
- Source Packages
- DPKG Queries
- Installing/Upgrading/Uninstalling Packages
- Labs
- Package Installers
- What Is yum?
- Configuring yum to Use Repositories
- Repository Files
- Queries
- Verifying Packages
- Installing/Removing/Upgrading Packages
- Additional Commands
- Labs
- What Is zypper?
- zypper Queries
- Installing/Removing/Upgrading
- Additional zypper Commands
- Labs
- RPM
- Advantages of Using RPM
- Package File Names
- Database Directory
- Helper Programs and Modifying Settings
- Queries
- Verifying Packages
- Installing Packages
- Uninstalling Packages
- Upgrading Packages
- Freshening Packages
- Upgrading the Kernel
- Using rpm2cpio
- Labs
- What Is APT?
- apt-get
- Queries Using apt-cache
- Installing/Removing/Upgrading
- Labs
- User Accounts
- Attributes of a User Account
- Creating User Accounts with useradd
- Modifying and Deleting User Accounts
- Locked Accounts
- User IDs and /etc/passwd
- /etc/shadow
- Why Use /etc/shadow?
- Password Management
- chage: Password Aging
- Restricted shell
- Restricted Accounts
- The root Account
- SSH
- ssh Configuration Files
- Labs
- Groups
- Group Management
- User Private Groups
- Group Membership
- Labs
- Owner, Group and World
- File Access Rights
- File Permissions and Security and Authentication
- Changing permissions: chmod
- chmod: Numerical Syntax for Permissions
- Changing User and Group File Ownership: chown and chgrp
- umask
- Filesystem ACLs
- Getting and Setting ACLs
- Labs
- PAM: A Unified Approach to Authentication
- Authentication Process
- PAM Configuration Files
- PAM Rules
- LDAP Authentication
- Labs
- Why Backups?
- What Needs Backup?
- Tape Drives
- Backup Methods
- Backup Strategies
- Backup Utilities
- cpio
- Using tar for Backups
- Using tar for Restoring Files
- Incremental Backups with tar
- Compression: gzip, bzip2 and xz and Backups
- dd
- dd Examples
- rsync
- dump and restore
- dump Options
- Level 0 backup with dump
- restore
- mt
- Backup Programs
- Labs
- Network Devices
- Problems with Network Device Names
- Predictable Network Interface Device Names
- Examples of the New Naming Scheme
- NIC Configuration Files
- ifconfig
- The ip Utility
- Examples of Using ip
- Routing
- Default Route
- Static Routes
- Name Resolution
- /etc/hosts
- DNS
- Network Diagnostic Utilities
- Labs
- What is a Firewall
- Firewall Interfaces and Tools
- firewalld
- firewalld Service Status
- Zones
- Zone Management
- Source Management
- Service and Port Management
- Labs
- Troubleshooting Overview
- Basic Techniques
- Intuition and Experience
- Things to Check: Networking
- Things to Check: File Integrity
- Boot Process Failures
- Filesystem Corruption and Recovery
- Using Rescue/Recovery Media
- Common Utilities on Rescue/Recovery Disks
- Using Rescue/Recovery Media
- Labs
- Emergency Boot Media
- Using Rescue Media
- Rescue USB Key
- Emergency Mode
- Single User Mode
- Labs
Case Study: Elizebeth Success Story,
with ITIL 4 Certification
“It is not the customer’s job to remember you. It is your obligation and responsibility to make sure they don’t have the chance to forget you.” Patricia Fripp
Linux is a fast growing open-source operating system which is finding its place in many businesses and organizations because of a number of features that make it better than others. Microsoft Windows is still the most widely used operating system in the world but for developers, organizations and unfortunately hackers, it has become the platform of choice over the years.
Linux is considered more secure and of course it is open source which makes it a better system for system administrators and other professionals. This is the reason businesses are looking for professionals with the appropriate knowledge about Linux. These individuals make considerably more in salaries than those proficient in Windows.
The first step in mastering cloud-based system development
Elizabeth had a Bachelor’s in Computer Sciences and was looking to find an interesting field for specialization when she landed a job as a Mobile Application Developer in a firm which specialized in providing digital solutions to other organizations. Being one of the highest scorers in her batch, she was able to cement her place in the company as an effective resource.
However, a couple of years went by and things began to change. During the decade which began after the recession of 2008, many people lost their jobs. More importantly, things began to change in the industry after 2010. While Elizabeth survived the downsizing during the hard economic times, she couldn’t defend her position when her company wanted to make place for developers who were proficient in Linux because the were shifting their focus towards cloud-based applications.
Now without a job and with no idea as to what she was going to do, Elizabeth was going through a tough time. She was one of the people who believed in the myth that most companies use Windows so why bother with learning Linux but now she had realized how wrong she was. During the next few months she spent a lot of time researching about the prospects of growth of Linux in the corporate sector. What she found out came as a surprise to her.
She understood now that she had to invest some time in learning the basics of Linux so she could become a part of software and application development which was happening in modern times. She was particularly interested in the notion of cloud based application development and learnt that Linux was the preferred platform for the purpose. She used her savings and some financial assistance to join a Linux bootcamp. At the end of it she gave and aced the Fundamentals of Linux Administration Certification.
.
This new specialization allowed her to find a great position as a Linux Administrator and a healthy increase in salary over her previous role. She is now looking to learn more about cybersecurity and the role Linux plays in it.
Final word
The Fundamentals of Linux Administration Certification allows individuals to take the first step towards learning the basics of Linux operations. The operating system is considered one of the easiest to learn yet the chances of professional growth it offers to experts are enormous.
CERTIFICATE OF
COMPLETION
The course prepares you for success with Linux Administrator Certification. Students will receive a certificate of completion upon completing all modules.
Ready to make the commitment?
