Powered By QuickStart

Fundamentals of Linux Administration Certification Training

Learn the In-demand Linux Administration Skills to Grow Your Career!

40 hours | Self-paced training | 12 months access

Course Price: $2,995


Share your contact information and a member of our admissions team will give you a call

Skills you will learn

Learn commands for installation, searches and manipulating files in a Linux environment.

Learn how to manage boot processes and security, schedule jobs, update system, monitor system performance.

Understand users and groups management. Add, delete, modify or configure LDAP and PAM.

Learn how to maintain network performance.

Get hands-on experience for DNS, Shares, SSH and SELinux/AppArmor configuration and setup servers for DHCP and HTTP.

Build expertise on system management by using partitions, logical and physical volumes, ACLs, quotas and clustering.

Companies recruiting Linux Certified professionals:

About the Training

The 40 hours self-paced online bootcamp is designed for professional who wishes to become a Linux Administrator. The course outline covers the administration and configuration of Linux families: Red Hat, SUSE, Debian or Ubuntu. Upon training completion, the students will be awarded a free practice exam and certificate of completion from Wagner College.


People who have little or no prior experience with Linux or Unix. System administrators, developers, architects, decision-makers or new Linux users can all benefit from the content covered in this class, especially if they are looking to work with more involved topics such as Linux system administration, network management and enterprise system architecture.


  • Senior Systems Administrator | $100,000
  • Systems Engineer, IT | $85,000
  • Linux Systems Administrator | $78,000

Course Outline

Chapter 01: Introduction to LFS
  • Relationship to LFS101x
  • Using as LFCS Exam Preparation
  • Course Formatting
  • Read the Documentation
  • Target Platform
  • Command Line vs Graphical Interface
  • Target Linux Distributions
  • Installation: What to Use for this Course
  • Course Timing
  • Lab Exercises
  • Change, Repetition, and Holy Wars
  • The Linux Foundation
  • Linux Foundation Training
  • Labs
Chapter 02: System Startup and Shutdown
  • Understanding the Boot Sequence
  • BIOS
  • Boot Loaders
  • Configuration Files in /etc
  • /etc/sysconfig
  • /etc/default
  • Shutting Down and Rebooting
  • Labs
Chapter 03: GRUB
  • What is GRUB?
  • Interactive Selections with GRUB at Boot
  • Installing GRUB
  • GRUB Device Nomenclature
  • Customizing the GRUB Configuration File
  • Labs
Chapter 04: init: SystemV, Upstart, systemd
  • The init Process
  • Startup Alternatives
  • SysVinit Runlevels
  • SysVinit and /etc/inittab
  • SysVinit Startup Scripts
  • chkconfig
  • service
  • chkconfig and service on Debian-based Systems
  • Upstart
  • Upstart Utilities
  • systemd
  • systemd Configuration Files
  • Systemctl
  • Labs
Chapter 05: Linux Filesystem Tree Layout
  • One Big File system
  • Data Distinctions
  • FHS Linux Standard Directory Tree
  • Main Directory Layout
  • The root (/) Directory and Filesystem
  • /bin
  • /root
  • Other Files and Directories in /boot
  • /dev
  • /etc
  • /home
  • /lib
  • /media
  • /mnt
  • /opt
  • /proc
  • /sys
  • /root
  • /sbin
  • /tmp
  • /usr
  • /var
  • /run
  • Labs
Chapter 06: Kernel Services and Configuration
  • Advantages of Kernel Modules
  • Module Utilities
  • Module Loading and Unloading
  • modprobe
  • Some Considerations with Modules
  • modinfo
  • Module Parameters
  • Kernel Module Configuration
  • Labs
Chapter 07: Devices and udev
  • Device Nodes
  • Major and Minor Numbers
  • udev
  • udev Components
  • udev and Hotplug
  • udev Rule Files
  • Creating udev Rules
  • Some Examples of Rules Files
  • Labs
Chapter 08: Partitioning and Formatting Disks
  • Common Disk Types
  • Disk Geometry
  • Partitioning
  • Why partition?
  • Partition Table
  • Naming Disk Devices and Nodes
  • More on SCSI Device Names
  • blkid and lsblk
  • Sizing up partitions
  • Backing up and Restoring Partition Tables
  • Partition table editors
  • Using fdisk
  • Labs
Chapter 09: Encrypting Disks
  • Why Use Encryption?
  • LUKS
  • cryptsetup
  • Using an Encrypted Partition
  • Mounting at Boot
  • Labs
Chapter 10: Linux Filesystems and the VFS
  • Filesystem Basics
  • Filesystem Tree Organization
  • Virtual File System (VFS)
  • Available Filesystems
  • Journalling Filesystems
  • Current Filesystem Types
  • Special Filesystems
  • Labs
Chapter 11: Filesystem Features: Attributes, Creating, Checking, Mounting
  • Inodes
  • Directory Files
  • Extended Attributes and lsattr/chattr
  • Creating and Formatting Filesystems
  • Checking and Fixing Filesystems
  • Mounting and Unmounting Filesystems
  • mount
  • mount Options
  • umount
  • Mounting Filesystems at Boot
  • Listing Currently Mounted Filesystems
  • Labs
Chapter 12: Filesystem Features: Swap, Quotas, Usage
  • Swap
  • Quotas
  • Setting up Quotas
  • quotacheck
  • Turning quotas on and off
  • Examining Quotas
  • Setting quotas
  • Filesystem Usage
  • Disk Space Usage
  • Labs
Chapter 13: The Ext2/Ext3/Ext4 Filesystems
  • Ext4 History and Basics
  • Ext4 Features
  • Ext4 Layout
  • Block Groups
  • dumpe2fs
  • tune2fs
  • Superblock Information
  • Data Blocks and Inodes
  • Ext4 Filesystem Enhancements
  • Labs
Chapter 14: The XFS and btrfs Filesystems
  • XFS Features
  • XFS Filesystem Maintenance
  • The btrfs Filesystem
  • Labs
Chapter 15: Logical Volume Management (LVM)
  • LVM
  • LVM and RAID
  • Volumes and Volume Groups
  • Logical Volumes Utilities
  • Creating Logical Volumes
  • Displaying Logical Volumes
  • Resizing Logical Volumes
  • Examples of Resizing
  • LVM Snapshots
  • Labs
Chapter 16: RAID
  • RAID
  • RAID Levels
  • Software RAID Configuration
  • Monitoring RAIDs
  • RAID Hot Spares
  • Labs
Chapter 17: Local System Security
  • Local System Security
  • Creating a Security Policy
  • What to Include in the Policy
  • What Risks to Assess
  • Choosing a Security Philosophy
  • Some General Security Guidelines
  • Updates and Security
  • Hardware Accessibility and Vulnerability
  • Hardware Access Guidelines
  • Protection of BIOS
  • Protecting the Boot Loader with Passwords
  • Filesystem Security: mount Options
  • setuid and setgid
  • Setting the setuid/setgid Bits
  • Labs
Chapter 18: Linux Security Modules
  • What are Linux Security Modules?
  • LSM Choices
  • SELinux Overview
  • SELinux Modes
  • SELinux Policies
  • Context Utilities
  • SELinux and Standard Command Line Tools
  • SELinux Context Inheritance and Preservation
  • restorecon
  • semanage fcontext
  • Using SELinux Booleans
  • getsebool and setsebool
  • Troubleshooting Tools
  • Additional Online Resources
  • AppArmor
  • Labs
Chapter 19: Processes
  • Processes, Programs and Threads
  • The init Process
  • Processes
  • Process Attributes
  • Controlling Processes with ulimit
  • Process Permissions and setuid
  • Process States
  • Execution Modes
  • User Mode
  • System Mode
  • Daemons
  • Kernel-Created Processes
  • Process Creating and Forking
  • Creating Processes in a Command Shell
  • Using nice to Set Priorities
  • Modifying the Nice Value
  • Labs
Chapter 20: Signals
  • What are Signals?
  • Types of Signals
  • kill
  • killall and pkill
  • Labs
Chapter 21: System Monitoring
  • Available Monitoring Tools
  • The /proc and /sys Pseudo-filesystems
  • /proc Basics
  • A Survey of /proc
  • /proc/sys
  • /sys Basics
  • A Survey of /sys
  • sar
  • Labs
Chapter 22: Process Monitoring
  • Monitoring Tools
  • Viewing Process States with ps
  • BSD Option Format for ps
  • ps Output Fields
  • UNIX Option Format for ps
  • Customizing the ps Output
  • Using pstree
  • Viewing System Loads with top
  • top Options
  • Labs
Chapter 23: I/O Monitoring and Tuning
  • Disk Bottlenecks
  • iostat
  • iostat Options
  • iostat Extended Options
  • iotop
  • Using ionice to Set I/O Priorities
  • Labs
Chapter 24: I/O Scheduling
  • I/O Scheduling
  • I/O Scheduler Choices
  • I/O Scheduling and SSD Devices
  • Tunables and Switching The I/O Scheduler at Run Time
  • CFQ (Completely Fair Queue Scheduler)
  • CFQ Tunables
  • Deadline Scheduler
  • Deadline Tunables
  • Labs
Chapter 25: Memory: Monitoring Usage and Tuning
  • Memory Tuning Considerations
  • Memory Monitoring Tools
  • /proc/sys/vm
  • vmstat
  • /proc/meminfo
  • OOM Killer
  • Labs
Chapter 26: Package Management Systems
  • Software Packaging Concepts
  • Why Use Packages?
  • Packages Types
  • Available Package Management Systems
  • Packaging Tool Levels and Varieties
  • Package Sources
  • Creating Software Packages
  • Labs
Chapter 27: RPM
  • RPM
  • Advantages of Using RPM
  • Package File Names
  • Database Directory
  • Helper Programs and Modifying Settings
  • Queries
  • Verifying Packages
  • Installing Packages
  • Uninstalling Packages
  • Upgrading Packages
  • Freshening Packages
  • Upgrading the Kernel
  • Using rpm2cpio
  • Labs
Chapter 28: DPKG
  • DPKG Essentials
  • Package File Names
  • Source Packages
  • DPKG Queries
  • Installing/Upgrading/Uninstalling Packages
  • Labs
Chapter 29: yum
  • Package Installers
  • What Is yum?
  • Configuring yum to Use Repositories
  • Repository Files
  • Queries
  • Verifying Packages
  • Installing/Removing/Upgrading Packages
  • Additional Commands
  • Labs
Chapter 30: zypper
  • What Is zypper?
  • zypper Queries
  • Installing/Removing/Upgrading
  • Additional zypper Commands
  • Labs
Chapter 27: RPM
  • RPM
  • Advantages of Using RPM
  • Package File Names
  • Database Directory
  • Helper Programs and Modifying Settings
  • Queries
  • Verifying Packages
  • Installing Packages
  • Uninstalling Packages
  • Upgrading Packages
  • Freshening Packages
  • Upgrading the Kernel
  • Using rpm2cpio
  • Labs
Chapter 31: APT
  • What Is APT?
  • apt-get
  • Queries Using apt-cache
  • Installing/Removing/Upgrading
  • Labs
Chapter 32: User Account Management
  • User Accounts
  • Attributes of a User Account
  • Creating User Accounts with useradd
  • Modifying and Deleting User Accounts
  • Locked Accounts
  • User IDs and /etc/passwd
  • /etc/shadow
  • Why Use /etc/shadow?
  • Password Management
  • chage: Password Aging
  • Restricted shell
  • Restricted Accounts
  • The root Account
  • SSH
  • ssh Configuration Files
  • Labs
Chapter 33: Group Management
  • Groups
  • Group Management
  • User Private Groups
  • Group Membership
  • Labs
Chapter 34: File Permissions and Ownership
  • Owner, Group and World
  • File Access Rights
  • File Permissions and Security and Authentication
  • Changing permissions: chmod
  • chmod: Numerical Syntax for Permissions
  • Changing User and Group File Ownership: chown and chgrp
  • umask
  • Filesystem ACLs
  • Getting and Setting ACLs
  • Labs
Chapter 35: Pluggable Authentication Modules (PAM)
  • PAM: A Unified Approach to Authentication
  • Authentication Process
  • PAM Configuration Files
  • PAM Rules
  • LDAP Authentication
  • Labs
Chapter 36: Backup and Recovery Methods
  • Why Backups?
  • What Needs Backup?
  • Tape Drives
  • Backup Methods
  • Backup Strategies
  • Backup Utilities
  • cpio
  • Using tar for Backups
  • Using tar for Restoring Files
  • Incremental Backups with tar
  • Compression: gzip, bzip2 and xz and Backups
  • dd
  • dd Examples
  • rsync
  • dump and restore
  • dump Options
  • Level 0 backup with dump
  • restore
  • mt
  • Backup Programs
  • Labs
Chapter 37: Network Devices and Configuration
  • Network Devices
  • Problems with Network Device Names
  • Predictable Network Interface Device Names
  • Examples of the New Naming Scheme
  • NIC Configuration Files
  • ifconfig
  • The ip Utility
  • Examples of Using ip
  • Routing
  • Default Route
  • Static Routes
  • Name Resolution
  • /etc/hosts
  • DNS
  • Network Diagnostic Utilities
  • Labs
Chapter 38: Firewalls
  • What is a Firewall
  • Firewall Interfaces and Tools
  • firewalld
  • firewalld Service Status
  • Zones
  • Zone Management
  • Source Management
  • Service and Port Management
  • Labs
Chapter 39: Basic Troubleshooting
  • Troubleshooting Overview
  • Basic Techniques
  • Intuition and Experience
  • Things to Check: Networking
  • Things to Check: File Integrity
  • Boot Process Failures
  • Filesystem Corruption and Recovery
  • Using Rescue/Recovery Media
  • Common Utilities on Rescue/Recovery Disks
  • Using Rescue/Recovery Media
  • Labs
Chapter 40: System Rescue
  • Emergency Boot Media
  • Using Rescue Media
  • Rescue USB Key
  • Emergency Mode
  • Single User Mode
  • Labs

Case Study: Elizebeth Success Story,
with ITIL 4 Certification

“It is not the customer’s job to remember you. It is your obligation and responsibility to make sure they don’t have the chance to forget you.” Patricia Fripp

Linux is a fast growing open-source operating system which is finding its place in many businesses and organizations because of a number of features that make it better than others. Microsoft Windows is still the most widely used operating system in the world but for developers, organizations and unfortunately hackers, it has become the platform of choice over the years.

Linux is considered more secure and of course it is open source which makes it a better system for system administrators and other professionals. This is the reason businesses are looking for professionals with the appropriate knowledge about Linux. These individuals make considerably more in salaries than those proficient in Windows.

The first step in mastering cloud-based system development

Elizabeth had a Bachelor’s in Computer Sciences and was looking to find an interesting field for specialization when she landed a job as a Mobile Application Developer in a firm which specialized in providing digital solutions to other organizations. Being one of the highest scorers in her batch, she was able to cement her place in the company as an effective resource. However, a couple of years went by and things began to change. During the decade which began after the recession of 2008, many people lost their jobs. More importantly, things began to change in the industry after 2010. While Elizabeth survived the downsizing during the hard economic times, she couldn’t defend her position when her company wanted to make place for developers who were proficient in Linux because the were shifting their focus towards cloud-based applications.

Now without a job and with no idea as to what she was going to do, Elizabeth was going through a tough time. She was one of the people who believed in the myth that most companies use Windows so why bother with learning Linux but now she had realized how wrong she was. During the next few months she spent a lot of time researching about the prospects of growth of Linux in the corporate sector. What she found out came as a surprise to her.

She understood now that she had to invest some time in learning the basics of Linux so she could become a part of software and application development which was happening in modern times. She was particularly interested in the notion of cloud based application development and learnt that Linux was the preferred platform for the purpose. She used her savings and some financial assistance to join a Linux bootcamp. At the end of it she gave and aced the Fundamentals of Linux Administration Certification.
This new specialization allowed her to find a great position as a Linux Administrator and a healthy increase in salary over her previous role. She is now looking to learn more about cybersecurity and the role Linux plays in it.

Final word

The Fundamentals of Linux Administration Certification allows individuals to take the first step towards learning the basics of Linux operations. The operating system is considered one of the easiest to learn yet the chances of professional growth it offers to experts are enormous.


The course prepares you for success with Linux Administrator Certification. Students will receive a certificate of completion upon completing all modules.

Ready to make the commitment?

Frequently Asked Questions About Virtual Instructor-Led Courses

I can't connect to my class, what are my options?
The link to the class is available upon logging in to your dashboard. If you are unable to see it, please contact our support team at 1-855-800-8240 and they will be happy to provide you the direct link via email or the dial in number.
I can't make it to attend to class. Can I reschedule?
Yes, you can reschedule your class. Please contact your Sales representative and they will arrange this for you. If you forgot his/her name, feel free to contact our support team at support@quickstart.com or 1-855-800-8240.
Will I get my certificate upon completion?
Yes. Upon completion of the course, it will be available on your course as a Trophy Icon for you to download. If you do not see this, you will need to contact support@quickstart.com with the following details so they can email you the certificate: Class Name, Class Date, Account Rep, and Your Email.
I cannot connect to my lab. Help!
Your Lab is accessible on the bottom part of your course. You will see a button that says "LAB". Just click it to launch the lab. Please note that some classes don’t need/require a LAB. You can verify with our support team by calling them at 1-855-800-8240 or by email at support@quickstart.com. You can also check with your Instructor or the Associate Instructor if your class includes one.
I don't have audio. I can't hear the instructor!
Make sure you are using a compatible headset for your laptop or computer. If you don’t have a headset, you can use the built-in speaker of your laptop. Otherwise, you can use the dial in option by calling the dial in number provided in the class joining email. You may also contact support team for the dial in numbers associated for your training at 1-855-800-8240 or contact them via email at support@quickstart.com.
How can I reach student support?
Support can be reach via phone at 1855-800-8240; via email at support@quickstart.com or via chat support through the chat button on our website. Please note that support office hours will be from 8am-5pm CST Monday to Friday. Any concerns after office hours will be attended the following business day.
Hit button to validate captcha