Linux System Administration II (Based on RHEL8)
What you'll learn
- Chapter 01. Introduction Linux System Administration II
- Chapter 02. Running commands Efficiently & BASH Scripts
- Chapter 03. Scheduling Jobs
- Chapter 04. Influencing process Schedules & Tuning
- Chapter 05. Access Control Lists
- Chapter 06. SELinux Security
- Chapter 07. Basic Storage Management (Partitions/File Systems/Persistent Mounts)
- Chapter 08. Logical Volume Management
- Chapter 09. Advanced Storage Features/ Layered Storage-Stratis
- Chapter 10. Network-Attached Storage (NAS)
- Chapter 11. Linux Boot Process
- Chapter 12. Securing Network
- Chapter 13. Understanding Linux Installation
- Chpater 14. Wrap-Up Sessions
Requirements
- Basic Linux command skills
- Desktop or Laptop with virtualization capability (VT Enabled Processor)
- Any virtualization tool like VMware workstation or virtual box
Description
This Course is designed for students who have experience on core Linux system administration tasks or having basic knowledge in of Linux commands or those who have completed the first course module. This course is intended to provide advanced Linux Administration skills.
After completing this course, you can take the most demanding Linux Administration certifications in the industry & enhance your Linux system administration skills which would help you confidently managing Linux based systems or servers.
What will students learn in your course?
Chapter 01. Introduction Linux System Administration II
Chapter 02. Running commands Efficiently & BASH Scripts
Chapter 03. Scheduling Jobs
Chapter 04. Influencing process Schedules & Tuning
Chapter 05. Access Control Lists
Chapter 06. SELinux Security
Chapter 07. Basic Storage Management (Partitions/File Systems/Persistent Mounts)
Chapter 08. Logical Volume Management
Chapter 09. Advanced Storage Features/ Layered Storage-Stratis
Chapter 10. Network-Attached Storage (NAS)
Chapter 11. Linux Boot Process
Chapter 12. Securing Network
Chapter 13. Understanding Linux Installation
Chpater 14. Wrap-Up Sessions
Are there any course requirements or prerequisites?
Basic Linux command skills
Desktop or Laptop with virtualization capability (VT Enabled Processor)
Any virtualization tool like VMware workstation or virtual box
Who are your target students?
Students who have completed basic Linux administration or Linux System Administration I
If you are certified on any of the Linux platform then you can directly take to this module
Who this course is for:
- Students who have completed basic Linux administration or Linux System Administration I
- If you are certified on any of the Linux platform then you can directly take to this module
Instructor
I am a cybersecurity consultant with 20 years of experience in the field. My journey in the realm of cybersecurity began two decades ago, when the internet was evolving, and the digital landscape was taking shape. I have since dedicated my career to navigating the complexities of cybersecurity, helping individuals and organizations safeguard their digital assets and information.
Throughout my career, I have witnessed the rapid evolution of technology and the ever-present threat of cyberattacks. From the early days of simple viruses and malware to the sophisticated cyber threats of today, I have remained at the forefront of cybersecurity, continuously adapting and innovating to stay ahead of the curve.
My expertise spans a wide range of areas, including network security, data protection, risk management, and compliance. I have worked with clients across various industries, from small businesses to multinational corporations, providing tailored cybersecurity solutions to meet their unique needs and challenges.
In addition to my work as a consultant, I am also passionate about educating others about cybersecurity best practices. I have conducted numerous workshops and training sessions, empowering individuals and organizations to take control of their digital security.
As a cybersecurity consultant with 20 years of experience, I am committed to staying at the forefront of the industry, continuously learning and adapting to the ever-changing landscape of cyber threats. My mission is to help individuals and organizations navigate the complexities of cybersecurity, ensuring that their digital assets and information are protected.