Linux Combined Courses

Linux Combined Courses in South Africa

2KO delivers Linux courses in Cape Town via instructor-led day classes; as well as online training aimed at Linux Certification. 2KO International Group provides IT & business training courses for learners of all levels, and is also a top-rated, certified supplier of online IT courses, enabling 2KO students the opportunity to study courses online world-wide, to ensure the best training possible. Our Linux courses are offered for individuals or small groups.

 

Overview:

2KO international presents Linux courses in our Cape Town locations. We specialise in certification training, and have been offering Linux training since 2003. All Linux trainers are Certified Trainers and have years of hands on experience, both in the classroom and in the field. Students attending our Linux Training will be prepared to sit the Linux Certification exams for whichever training they do.

 

Duration: 

2 weeks full time.

 

Target Audience:

Those responsible for the design, support and maintenance of new and existing Linux systems benefit from this course.

 

Training Pre-requisites:

General computing knowledge and experience. No prior knowledge with Linux is required.

 

Outline for LPI 101

Manage File Permissions and Ownership

LPI Objectives Covered

Filesystem Hierarchy Standard

Navigating the Filesystem

Displaying Directory Contents

Determining Disk Usage

File Ownership

Default Group Ownership

File and Directory Permissions

File Creation Permissions

Changing File Permissions

SUID and SGID on files

SGID and Sticky Bit on Directories

User Private Group Scheme

 

Create, Delete, Find, and Display Files

LPI Objectives Covered

Directory Manipulation

File Manipulation

Deleting and Creating Files

Physical Unix File Structure

Filesystem Links

File Extensions and Content

Displaying Files

Previewing Files

Displaying Binary Files

Searching the Filesystem

Alternate Search Method

Shared Libraries

 

Work With Archives and Compression

LPI Objectives Covered

Archives with tar

Archives with cpio

The gzip Compression Utility

The bzip2 Compression Utility

The PKZIP Archiving/Compression format

 

Process Text Streams Using Filters

LPI Objectives Covered

Producing File Statistics

Searching Inside Files

The Streaming Editor

Text Processing with awk

Replacing Text Characters

Text Sorting

Duplicate Removal Utility

Extracting Columns of Text

Merging Multiple Files

 

Work On The Command Line

LPI Objectives Covered

Role of Command Shell

Shells

Identifying the Shell

Changing the Shell

sh: Prompts

bash: Bourne Again Shell

bash: Command Editing

bash: Command Completion

Shell/Environment Variables

Key Environment Variables

 

Use Streams, Pipes, and Redirects

LPI Objectives Covered

File Redirection

Piping Commands Together

Filename Matching

File Globbing and Wildcard Patterns

Brace Expansion

General Quoting Rules

Nesting Commands

Multiple and Multi-line Commands

 

Search Text Files Using Regular Expressions

LPI Objectives Covered

Regular Expression Overview

Regular Expressions

RE Character Classes

RE Quantifiers

RE Parenthesis

 

Perform Basic File Editing Operations Using Vi

LPI Objectives Covered

Text Editing

vi and Vim

Basic vi

Learning vi

Intermediate vi

 

Create, Monitor, and Kill Processes

LPI Objectives Covered

What is a Process?

Process Creation

Process States

Viewing Processes

Signals

Tools to Send Signals

Job Control Basics

Jobs

 

Use RPM, YUM, and Debian Package Management

LPI Objectives Covered

Managing Software

Working With RPMs

Querying and Verifying with RPM

Installing Debian Packages

Querying and Verifying with dpkg

The alien Package Conversion Tool

Intro to Package Management

Using the YUM command

Configuring YUM

The dselect & APT Frontends to dpkg

Aptitude

Configuring APT

Compiling/Installing from Source

Installing Source RPM Packages

 

Work With Partitions, Filesystems, and Disk Quotas

LPI Objectives Covered

Partition Considerations

Partition Planning

Partition Tables

File System Creation

Filesystem Support

UNIX/Linux Filesystem Features

Swap

Filesystem Considerations

Journaled Filesystems

Filesystem Maintenance

Mounting Filesystems

NFS

SMB

Filesystem Table

Configuring Disk Quotas

Setting Quotas

Viewing and Monitoring Quotas

 

Linux Boot Process

LPI Objectives Covered

Booting Linux on PCs

LILO Options

GRUB Configuration

Kernel Boot Parameters

/sbin/init

System Init Styles

Linux Runlevels

/etc/inittab

/etc/init.d/*

/etc/rc.sysinit

SUSE /etc/init.d/boot

Ubuntu /etc/event.d/rcS

/etc/init.d/ and rc#.d/

rc

Shutdown and Reboot

 

Determine and Configure Hardware Settings

LPI Objectives Covered

Linux Device Files

Detecting New Hardware Manually

Configuring New Hardware with Kudzu

Configuring New Hardware with hwinfo

PC System Hardware

USB Devices

USB Configuration

Configuring Kernel Modules

Kernel Modules

Handling Module Dependencies

Configuring the Kernel via /proc/

Kernel Hardware Info - /sys/

/sys/ Structure

 

Linux Fundamentals

UNIX Design Principles

FSF and GNU

GPL - General Public License

The Linux Kernel

Popular Uses of Linux

Components of Distributions

Standardization

Red Hat

SUSE Linux Products

Debian

Ubuntu

Logging In

got root?

Switching User Contexts

Gathering Login Session Info

Gathering System Info

Help from Commands and Documentation

Getting Help with man & info

$MANPATH, what is and apropos

 

Outline for LPI 102

Account and Security Administration

LPI Objectives Covered

User and Group Concepts

User Private Group Scheme

User Administration

Modifying Accounts

Group Administration

Password Aging

Default User Files

su and Wheel

sudo

Setting Resource Limits via ulimit

/lib/modules/pam_limits.so

 

Customizing the Shell and Writing Simple Scripts

LPI Objectives Covered

sh: Configuration Files

sh: Script Execution

bash: Configuration Files

bash: Command Line History

bash: "shortcuts"

bash: prompt

Shell Scripting

Example Shell Script

Positional Parameters

Input & Output

Doing Math

Comparisons with test

Exit Status

Conditional Statements

Flow Control: case

The for Loop

The while Loop

 

Automating Tasks

LPI Objectives Covered

Automating Tasks

at/batch

at Access Control

cron

The crontab Command

crontab Format

/etc/cron.*/ Directories

anacron

 

Networking

LPI Objectives Covered

IPv4 Fundamentals

TCP/IP Fundamentals

Enabling IPv6

Linux Network Interfaces

Ethernet Hardware Tools

Runtime configuration change

Configuring Routing Tables

Advanced Configuration

Starting and Stopping Interfaces

RHEL Configuration Tools

SUSE YaST Configuration Tool

GNOME Network Administration Tool

DNS Clients

Network Diagnostics

Information from netstat

 

X Window System

LPI Objectives Covered

The X Window System

X Modularity

X.Org Drivers

Starting X

Configuring X Manually

system-config-display on RHEL5.3

sax2 & yast x11 on SLES11

The X11 Protocol and Display Names

Display Manager Concepts

Display Managers and Graphical Login

X Access Control

Remote X Access (historical/insecure approach)

Remote X Access (modern/secure approach)

Customizing X Sessions

Starting X Apps Automatically

Window Manager Concepts

 

Accessibility and Localization

GNOME Accessibility Support

Internationalization & Localization

Character Encodings

Locales

Setting the Time Zone

 

Time, Logging, and Printing

LPI Objectives Covered

Managing System Time

Managing Network-Wide Time

Continual Time Sync with NTP

Configuring NTP Clients

System Logging

/etc/syslog.conf

Common UNIX Printing System

Configuring Print Queues

Standard Print Commands

Format Conversion Utilities

Common UNIX Printing System

Defining a Printer

 

Fundamentals of MTA's and SQL

LPI Objectives Covered

SQL Databases

SQL: Adding and Changing Data

SQL: Viewing and Removing Data

SMTP

SMTP Terminology

SMTP Architecture

SMTP Commands

SMTP Extensions

SMTP Session

Sendmail Architecture

Sendmail Components

Sendmail Configuration

Databases

Exim

Postfix Features

Postfix Architecture

Postfix Components

Postfix Configuration

master.cf

main.cf

 

Host Security and Encryption

LPI Objectives Covered

Controlling Logins

xinetd

Xinetd Configuration and Access Control

Xinetd Connection Limiting

Xinetd: Resource limits, redirection, logging

TCP Wrappers

/etc/hosts.{allow,deny} Shortcuts

Advanced TCP Wrappers

Secure Shell

ssh and sshd Configuration

Accessing Remote Shells

Transferring Files

Alternative sftp Clients

SSH Key Management

ssh-agent