Linux Combined Courses

Linux Combined Courses in South Africa

2KO delivers Linux courses in Cape Town via instructor-led day classes; as well as online training aimed at Linux Certification. 2KO International delivers state-of-the-art IT consulting, services and best-of-breed training for multiple vendors. Our innovative courses are offered either as instructor led classes or as online e-learning, enabling 2KO students the opportunity to study courses online world-wide, to ensure students have access to the best training possible. Our Linux courses are offered for individuals or small groups.




2KO international presents Linux courses in our Cape Town locations. We specialise in certification training, and have been offering Linux training since 2003. All Linux trainers are Certified Trainers and have years of hands on experience, both in the classroom and in the field. Students attending our Linux Training will be prepared to sit the Linux Certification exams for whichever training they do.



2 weeks full time.


Target Audience:

Those responsible for the design, support and maintenance of new and existing Linux systems benefit from this course.


Training Pre-requisites:

General computing knowledge and experience. No prior knowledge with Linux is required.


Outline for LPI 101

Manage File Permissions and Ownership

LPI Objectives Covered

Filesystem Hierarchy Standard

Navigating the Filesystem

Displaying Directory Contents

Determining Disk Usage

File Ownership

Default Group Ownership

File and Directory Permissions

File Creation Permissions

Changing File Permissions

SUID and SGID on files

SGID and Sticky Bit on Directories

User Private Group Scheme


Create, Delete, Find, and Display Files

LPI Objectives Covered

Directory Manipulation

File Manipulation

Deleting and Creating Files

Physical Unix File Structure

Filesystem Links

File Extensions and Content

Displaying Files

Previewing Files

Displaying Binary Files

Searching the Filesystem

Alternate Search Method

Shared Libraries


Work With Archives and Compression

LPI Objectives Covered

Archives with tar

Archives with cpio

The gzip Compression Utility

The bzip2 Compression Utility

The PKZIP Archiving/Compression format


Process Text Streams Using Filters

LPI Objectives Covered

Producing File Statistics

Searching Inside Files

The Streaming Editor

Text Processing with awk

Replacing Text Characters

Text Sorting

Duplicate Removal Utility

Extracting Columns of Text

Merging Multiple Files


Work On The Command Line

LPI Objectives Covered

Role of Command Shell


Identifying the Shell

Changing the Shell

sh: Prompts

bash: Bourne Again Shell

bash: Command Editing

bash: Command Completion

Shell/Environment Variables

Key Environment Variables


Use Streams, Pipes, and Redirects

LPI Objectives Covered

File Redirection

Piping Commands Together

Filename Matching

File Globbing and Wildcard Patterns

Brace Expansion

General Quoting Rules

Nesting Commands

Multiple and Multi-line Commands


Search Text Files Using Regular Expressions

LPI Objectives Covered

Regular Expression Overview

Regular Expressions

RE Character Classes

RE Quantifiers

RE Parenthesis


Perform Basic File Editing Operations Using Vi

LPI Objectives Covered

Text Editing

vi and Vim

Basic vi

Learning vi

Intermediate vi


Create, Monitor, and Kill Processes

LPI Objectives Covered

What is a Process?

Process Creation

Process States

Viewing Processes


Tools to Send Signals

Job Control Basics



Use RPM, YUM, and Debian Package Management

LPI Objectives Covered

Managing Software

Working With RPMs

Querying and Verifying with RPM

Installing Debian Packages

Querying and Verifying with dpkg

The alien Package Conversion Tool

Intro to Package Management

Using the YUM command

Configuring YUM

The dselect & APT Frontends to dpkg


Configuring APT

Compiling/Installing from Source

Installing Source RPM Packages


Work With Partitions, Filesystems, and Disk Quotas

LPI Objectives Covered

Partition Considerations

Partition Planning

Partition Tables

File System Creation

Filesystem Support

UNIX/Linux Filesystem Features


Filesystem Considerations

Journaled Filesystems

Filesystem Maintenance

Mounting Filesystems



Filesystem Table

Configuring Disk Quotas

Setting Quotas

Viewing and Monitoring Quotas


Linux Boot Process

LPI Objectives Covered

Booting Linux on PCs

LILO Options

GRUB Configuration

Kernel Boot Parameters


System Init Styles

Linux Runlevels




SUSE /etc/init.d/boot

Ubuntu /etc/event.d/rcS

/etc/init.d/ and rc#.d/


Shutdown and Reboot


Determine and Configure Hardware Settings

LPI Objectives Covered

Linux Device Files

Detecting New Hardware Manually

Configuring New Hardware with Kudzu

Configuring New Hardware with hwinfo

PC System Hardware

USB Devices

USB Configuration

Configuring Kernel Modules

Kernel Modules

Handling Module Dependencies

Configuring the Kernel via /proc/

Kernel Hardware Info - /sys/

/sys/ Structure


Linux Fundamentals

UNIX Design Principles


GPL - General Public License

The Linux Kernel

Popular Uses of Linux

Components of Distributions


Red Hat

SUSE Linux Products



Logging In

got root?

Switching User Contexts

Gathering Login Session Info

Gathering System Info

Help from Commands and Documentation

Getting Help with man & info

$MANPATH, what is and apropos


Outline for LPI 102

Account and Security Administration

LPI Objectives Covered

User and Group Concepts

User Private Group Scheme

User Administration

Modifying Accounts

Group Administration

Password Aging

Default User Files

su and Wheel


Setting Resource Limits via ulimit



Customizing the Shell and Writing Simple Scripts

LPI Objectives Covered

sh: Configuration Files

sh: Script Execution

bash: Configuration Files

bash: Command Line History

bash: "shortcuts"

bash: prompt

Shell Scripting

Example Shell Script

Positional Parameters

Input & Output

Doing Math

Comparisons with test

Exit Status

Conditional Statements

Flow Control: case

The for Loop

The while Loop


Automating Tasks

LPI Objectives Covered

Automating Tasks


at Access Control


The crontab Command

crontab Format

/etc/cron.*/ Directories




LPI Objectives Covered

IPv4 Fundamentals

TCP/IP Fundamentals

Enabling IPv6

Linux Network Interfaces

Ethernet Hardware Tools

Runtime configuration change

Configuring Routing Tables

Advanced Configuration

Starting and Stopping Interfaces

RHEL Configuration Tools

SUSE YaST Configuration Tool

GNOME Network Administration Tool

DNS Clients

Network Diagnostics

Information from netstat


X Window System

LPI Objectives Covered

The X Window System

X Modularity

X.Org Drivers

Starting X

Configuring X Manually

system-config-display on RHEL5.3

sax2 & yast x11 on SLES11

The X11 Protocol and Display Names

Display Manager Concepts

Display Managers and Graphical Login

X Access Control

Remote X Access (historical/insecure approach)

Remote X Access (modern/secure approach)

Customizing X Sessions

Starting X Apps Automatically

Window Manager Concepts


Accessibility and Localization

GNOME Accessibility Support

Internationalization & Localization

Character Encodings


Setting the Time Zone


Time, Logging, and Printing

LPI Objectives Covered

Managing System Time

Managing Network-Wide Time

Continual Time Sync with NTP

Configuring NTP Clients

System Logging


Common UNIX Printing System

Configuring Print Queues

Standard Print Commands

Format Conversion Utilities

Common UNIX Printing System

Defining a Printer


Fundamentals of MTA's and SQL

LPI Objectives Covered

SQL Databases

SQL: Adding and Changing Data

SQL: Viewing and Removing Data


SMTP Terminology

SMTP Architecture

SMTP Commands

SMTP Extensions

SMTP Session

Sendmail Architecture

Sendmail Components

Sendmail Configuration



Postfix Features

Postfix Architecture

Postfix Components

Postfix Configuration


Host Security and Encryption

LPI Objectives Covered

Controlling Logins


Xinetd Configuration and Access Control

Xinetd Connection Limiting

Xinetd: Resource limits, redirection, logging

TCP Wrappers

/etc/hosts.{allow,deny} Shortcuts

Advanced TCP Wrappers

Secure Shell

ssh and sshd Configuration

Accessing Remote Shells

Transferring Files

Alternative sftp Clients

SSH Key Management