Why learn about Linux Essential?
Linux Essentials are an excellent operating system. It helps computer software and manages all the internal tasks of computer. On the other hand, we can say that this is software that makes the connection between hardware and software of a computer.
This is a kind of open-source operating system invented in 1991 for the computer. It is just like a true operating system for some commercial networking devices. We can say that this is a very special kind of operating system so it is only supported by some major computers.
Linux Essentials Certifications: Details
Now in this section, we will talk about some important points about Linux Essential Certification in the course. If you want to take Linux Essential Course you have to know that where you will get this course and the benefits of this course.
There are so many online academies that are providing this course you can take this course. Before taking this course, you have to check the rating of the course and reviews of this course.
This is a course in which you will learn about Linux and Linux Administration. There are many tutorials and pdf of every class available, you can take these classes at any time. All these courses are designed by some experts and experienced people, you can easily understand everything about Linux in these courses.
Session 1. Unix/Linux History
-
Unix History - Roots &
Birth of Unix
-
Unix Philosophy
-
The Law
-
Results of Consent Decree
-
AT&T Unix Policy
-
Why Unix/Linux Instead of Other OSs?
-
What is Linux
-
What’s An Operating System?
-
The System View of Linux/Unix
-
Why Linux?
-
Linux Shells - Bourne (sh) & bash Shell (bash)
-
Superuser
-
Password Security
-
Logging In and Out
-
What happens when you login? - Linux
-
exit or logout
-
Linux Processes
-
Command Components and Notation
-
Example – who Command
Session 2. The BIOS and the UEFI
-
UEFI
-
GUID Partition Table
-
The Boot Process
-
The BIOS and the UEFI
-
Basic System Configuration
-
The UEFI Menu
-
The Bootloader
-
Startup Menus - Boot Menu
-
Linux Bootloaders
Session 3. Getting Started with Linux
-
Virtual Consoles
-
The shell prompts
-
Getting Help
-
Linux Commands
-
Simple Commands - pwd, date, who, id, whoami, who am i, uname, which, tty
-
Files & Directories Management Commands
Session 4. Users, Groups & Permissions, Configuring the Bash Shell and Finding & processing Files
-
The Linux Security Model
-
Users and Groups - The root user
-
Linux File Security - Permission Types
-
Linux Process Security
-
Changing Permissions- Symbolic Method & Numeric Method
-
Configuring Bash Shell – Variables and Aliases
-
Other Shell Configuration Methods - Environment Variables
-
Common Environment Variables
-
How the Shell Expands the Command line
-
Shell Startup Scripts
-
/etc/profile
-
/etc/profile.d
-
~/.bash_profile and ~/.bashrc
-
~/.bash_logout
-
Archiving Files
-
Using file Compression
-
The find Command
Session 5. File Management Commands in Linux.
-
File System – Files, Directories and File Names
-
File Name Rules
-
Path Names – Absolute & Relative Pathnames
-
The inode
-
LiNk - ln
-
Hard and Soft Links?
-
The more Command
-
Word Count - wc
-
The history Commnad
-
The file Command
Session 6. Linux Commands & Command-Line Tools
-
Some Useful Commands
-
Converting Tabs into Spaces
-
The head and tail commands
-
Merging Lines with paste
-
Breaking a file into pieces using split command
-
Translating characters with tr command
-
Working with duplicate lines with uniq and sort
-
Extracting text with cut command
-
Formatting content with pr command
-
Command Line Tools
-
Checking Ports with telnet & nmap
-
Command line E-mail Client
-
Methods for using mail
-
Reading Mail Messages
-
Text and Graphical Browsers
-
Elinks Web Browser
-
Using lftp to Access URLs
-
List of ftp Commands
Session 7. Input Output Redirection and Process Concept
-
Standard Input and Output
-
Redirecting Input and Output
-
Redirecting and Piping
-
Overwriting or Appending
-
Redirecting Standard Error and Both Standard Output and Error
-
Using Pipes To Connect Processes
-
Useful Pipe Targets
-
What is a process and How Processes are created?
-
Process Ancestry and Process States
-
Viewing process
-
Sending Signals to Processes -Terminating Processes
-
Interactive Process Management Tools
-
Altering process scheduling priority
-
Running a Process in the Background
-
Suspending a Process
-
Listing Background and Suspended Jobs
-
Resuming Suspended Jobs
-
Compound Commands
Session 8. Job Scheduling
-
Scheduling a Process to Execute Later
-
Interaction between at.allow & at.deny
-
Scheduling Periodic Processes
-
Using cron
-
Crontab File Format
-
Controlling access to the crontab command
Session 9. Regular Expressions and grep
-
Pattern Matching with Regular Expressions
-
Tools that use Regular Expressions
-
The grep Command
-
Common options of grep
-
Wildcard characters with Examples
-
Modifiers with Examples
-
Anchors with Example
-
regex combinations and Quoting
Session 10. Vi Editor
-
Overview of vi and vim
-
Starting vi and vim - with different options
-
Three modes of vi and vim
-
Cursor Movement Commands
-
Entering and Leaving Insert Mode
-
Change, Delete and Yank and Put
-
Undoing Changes
-
Searching for Text
-
Command-Mode Tricks
-
Saving and Exiting: ex mode
Session 11 Administration with the Secure Shell and Secure Copy
-
Introduction to SSH
-
Configure an SSH Client
-
Command-Line Access
-
SSH Command-Line Tools
-
Graphical Secure Shell Access
Session 12 Linux Network Client Tools
-
GUI Web Browser
-
Non GUI Web browsers
-
The wget Command
-
Remote access and file transfer
-
ssh - Secure shell and scp : Secure copy
-
telnet and the ‘r’ services
-
The rsync Command
-
The lftp Command
-
The smbclient Command
-
Network Diagnostic Tools
Session 13 Basic Firewall Control
-
Basic Firewall Control
-
Standard Ports
-
The iptables Command
-
The Iptables – Getting started
-
Start and enable the firewall Service
-
The iptables Service
-
Understanding /etc/sysconfig/iptables File
-
The firewalld Service
-
Default Zones
-
The firewall-config Tool
-
How firewall Works
-
Examples of Services
-
The firewall-cmd Configuration Tool
-
Example - Adjust Firewall Settings
Session 14 Shell Scripting Part 1
-
Scripting Basics
-
Creating Shell Scripts
-
Generating Output and Handling Input
-
bash scripts example
-
Exit Status
-
Control Structures
-
Conditional Execution
Session 15 Shell Scripting Part 2
-
Selection Structures: Using if/else and case Statement
-
Repetition Structures: The for-loop
-
for and sequences
Session 16 Securing SSH with Key-Based Authentication
-
Securing SSH with Key-Based Authentication
-
SSH Configuration Commands
-
SSH Client Configuration Files
-
Basic Encrypted Communication
-
Private Keys and Public Keys
-
Set Up a Private/Public Pair Keys
Session 17 Bootloaders and GRUB 2
-
GRUB 2, the GRand Unified Bootloader V2
-
Boot into Different Targets
-
Targets and Run Levels
-
Kernel Parameters for targets
-
Check your current Target
-
Booting with Different Targets
-
Recovering the Root Password
-
Modify the System Bootloader
-
Example Entry in /boot/grub2/grub.cfg
-
The File grub.cfg
-
Generating GRUB Conf from /etc/default/grub
-
Understanding /etc/default/grub
-
How to Update GRUB
-
The GRUB 2 Command Line
-
GRUB 2 Prompt to boot Manually
-
Reinstall GRUB 2
-
Booting from GRUB 2: Rescue Mode
Session 18 Control by Target and Time Synchronization
-
Control by Target
-
Functionality by Target
-
Other Services started by graphical.target
-
The Innards of systemd Units
-
Using systemctl to start and stop a service
-
Service Configuration
-
Time Synchronization and Time Zone Configuration
-
Sync the Time with chronyd
-
Sync the Time with ntpd
-
The ntp Command
Session 19 Storage Management and Partitions
-
Linux Filesystem Administration
-
Storage Management and Partitions
-
Current System State
-
The fdisk Utility – With Examples
-
Some of the Partition Types
-
The gdisk Utility – with Examples
-
The parted Utility – With Examples
-
Changing Partition Type
-
Graphical Options
-
Examples of fdisk and parted
Session 20 Filesystem Formats
-
Filesystem Formats
-
Standard Formatting Filesystems
-
Some Standard Filesystems
-
Journaling Filesystems
-
Filesystem Format Commands
-
Some Journaling Filesystems
-
The mkfs Command
-
Swap Volumes
-
Filesystem Check Commands
-
Working with Filesystems
Session 21 Logical Volume Management
-
Logical Volume Management (LVM)
-
Sequence of steps
-
Create a Physical Volume
-
Create a Volume Group
-
Create a Logical Volume
-
Make Use of a Logical Volume
-
Physical Volume Management Commands
-
Volume Group Commands
-
Logical Volume Commands
-
Checking Existing LVM
-
Remove a Logical Volume
-
Resize Logical Volumes
Session 22 Filesystem Management
-
Filesystem Management
-
The /etc/fstab File
-
Why UUID?
-
The /etc/fstab Column, Left to Right
-
Universally Unique Identifiers in /etc/fstab
-
Getting UUID
-
The mount Command
-
Mount, fstab and ACLs
-
More Filesystem Mount Options
-
Options for mount Command and /etc/fstab
-
Virtual Filesystems
-
Add Your Own Filesystems to /etc/fstab
-
Removable Media and /etc/fstab
-
Unmounting a Removable Media
-
Mounting CD through fstab
-
Networked Filesystems
-
Mounting NFS Directory
Session 23 The Red Hat Package Manager
-
The Red Hat Package Manager
-
Red Hat Subscription Management
-
A RedHat/CentOS RPM Package?
-
The RPM Database
-
RPM and backup of old Configurations
-
A Package Repository and Database
-
Install an RPM Package
-
The rpm and Dependencies
-
More on Install and Upgrade
-
Uninstall an RPM Package
-
Install RPMs from Remote Systems
-
Installation Security
-
The /etc/pki/rpm-gpg Directory
-
Special RPM Procedures with the Kernel
-
Kernel Upgrade - Precautions
-
Kernel Install – After installation
-
Files in the /boot Directory
-
Package Queries
-
Package Signatures
-
The algorithms used to verify package integrity
-
File Verification with Examples
Session 24 The yum Command in Linux
-
Dependencies and the yum Command
-
Dependency Hell
-
Relief from Dependency Hell
-
Basic yum Configuration
-
The yum conf Directives
-
Files in /etc/yum/pluginconf.d Directory
-
Configuration Files in the /etc/yum.repos.d
-
Custom Configuration File
-
Create a yum Repo from DVD
-
Yum cache Clean up
-
Third-party Repositories
-
Basic yum Commands
-
Installation Mode
-
Installation/update with yum
-
Security and yum
-
Updates and Security Fixes
-
Package Groups and yum
-
Removing a Group
Session 25 User Account Management
-
User Account Management
-
Different Kinds of Users
-
The Shadow Password Suite
-
The /etc/passwd File and its fields
-
The /etc/group File and its fields
-
The /etc/shadow File and its fields
-
The /etc/gshadow File and its fields
-
The /etc/login.defs File
-
The /etc/login.defs Password Parameters
-
Add Users Directly
-
Add Users to a Group Directly
-
Add Users at the Command Line
-
The useradd Command Options
-
Add or Delete a Group at the Command Line
-
Delete a User
-
Add a User with the Red Hat User Manager
-
Real and Fake Shells
-
Modify an Account
-
User Properties -Groups
-
More User/Group Management Commands
-
The usermod Options
-
The groupmod and chage Commands
-
The chage Command Options