Linux Training Courses

Linux Training

GNU/Linux courses

Client Testimonials

Ubuntu DeskTop

This course was very valuable to me as it balanced learning specific tasks, with understanding potential and context. Trainer created a great environment, both relaxed enough and rigorous enough for productive learning.


Rachel Lewsley - NEAFC

Linux LPI LPIC-1 Exam 101 Preparation

Always an enjoyable session with Bernard.


Henry Blyth - Oxfordshire County Council

Docker for Developers and System Administrators

The content was interesting

Leke Adeboye - CISCO

Docker for Developers and System Administrators

A lot of content explained in a simple and straightforward manner, will definitely remember many of the things taught thanks to the simple format.


Linux LPI LPIC-1 Exam 101 Preparation

Scripting, tips


Linux LPI LPIC-1 Exam 101 Preparation

Scripting, managing packages


Linux LPI LPIC-1 Exam 101 Preparation

It was easy to follow and the machine was working perfectly



LXC Training

Linux Course Outlines

Code Name Duration Overview
linuxnetadmin Network Administering in Linux 14 hours The course participant will answer the following questions: How to build a network based on TCP / IP? How to plan a TCP / IP network. What are the tools available in the system? How do I share files? How does e-mail? How to configure the hardware in Linux? Basic Information History network, TCP / IP and UUCP Networking in linux Introduction to TCP / IP protocol Network interface IP Address Address Resolution IP Routing ICMP The Internet Control Message Protocol Resolving Host Names The hardware configuration Configuring the kernel The types of network devices Installing Ethernet cards Discussion protocols PLIP, PPP, SLIP Setting up a network based on TCP / IP Determining the name (hostname) IP Address Assignment Create a subnet File management hosts and networks Configuring network Interfaceów All about ifconfig Interfaceów configuration using iproute2 package traceroute command The command netstat Managing the ARP table DNS Configuration Firewall TCP / IP Designing a firewall Netfilter and IP Tables Starting network services Super Server inetd (xinetd) versus standalone Managing access to services through tcpd File Services and Protocols Network File System (NFS) Mounts NFS shares NFS Server Configuration Electronic Mail SMTP and POP3 protocols Simple setup for postfix
Munin Monitoring your resources with Munin 7 hours Audience System administrators Network administrators Network engineers IT managers IT administrators Format of the course 60% lectures 30% hands-on exercises 10% tests Munin is an open-source monitoring tool that helps system administrators monitor resources such as servers, workstations, networks, SANs, applications, network devices, etc. It shows resource trends and provides insights to into questions such as "what just happened to kill our performance?" It includes visualization tools and is available on various flavors of Linux and FreeBSD. Introduction Master-node architecture Installation Requirements Master and node setup Monitoring with Munin Visualizing resources and trends Graphing system Data logging Integration with Nagios Monitoring Windows nodes Working with Plugins Working with the API Troubleshooting Munin Closing remarks  
linuxsec Linux Security 14 hours During the course, participants will learn among other things as: How to hack into the server and how to protect your server against hackers? How to see the user's password and how to select the password? How to limit user resources (memory, CPU time, the maximum number of processes, number of logins, etc ...)? How to check if the files on the disk are damaged or how to check if someone with them "tinkered"? How to send log files to remote machine? How to protect your log files before modification? How to securely erase files so that no one could have them anymore preview? How to create an encrypted file system? How to encrypt and sign files? How to protect yourself from exploits? Securing the physical console Protection against accidental restart CTRL + ALT + DEL Prevention booting kernel with additional parameters Automatic session logout Locking the virtual console Upgrading the system The rights and ownership Umask SUID Sticky bit Hard links Security file systems Mounts partition with additional parameters Determining the size of the partition and file system Capacity Limits for Users (quota) Backup system Data integrity checking MD5sum and friends TRIPWIRE dm-verify Safe file delete Secure delete (s) attribute Secure undelete (d) attribute Wipe, shred Filesystem encryption dm-crypt LUKS ecryptfs File signing and encryption Program GnuPG Program PGP Login accounting Process accounting Program and kernel messages logging Remote logging Securing logfiles Preventing log tampering Next generation syslog journald Log monitoring Log files and other forms of monitoring Cracking passwords Login and PAM System security and Kernel OpenWall GetRewted LIDS RBSAC
flatpak Flatpak - the future of application distribution 14 hours Flatpak is a utility for software deployment, package management, and application virtualization for Linux desktop computer environments. It provides a sandbox environment in which users can run applications in isolation from the rest of the system. This course teaches the basic usage of Flatpak, useful both for developers and system administrators. The course includes a lot of hands on exercises and the participants will practice in their own environment and build their own Flatpak images. Audience     Developers     Sysadmins     Managers Introduction to Flatpak Elements of a Flatpak application Installation and setup Building your first app Using the Flatpak Builder Working with the Sandbox Distributing your application
linuxnetsec Network Security in Linux 14 hours During the course, participants will learn: What is denial of service attacks, Flooding, Sniffing, MIM? How to break from the network to the server? How to watch packets on the network (also running on switches)? Do you watch any combination of the world? How to monitor the network? How to configure a firewall? How to use encrypted connections? How to create tunnels? How to log packets? How to scan ports? How to reduce the number of unnecessary services on the server? Turn off unnecessary services Flood Ping Sniffing Sniffit Ettercap Tcpdump Network monitoring Scanning ports (nmap, nessus) LAN traffic monitor (iptraf) Monitoring changes in Ethernet network interface cards, and IP number by users (arpwatch) Dump traffic on a network (tcpdump) Logging packets Log packets from the use of mechanisms NetFilters and iptables IP Protocols Logger (ippl) Firewall (based on NetFilters and iptables) Packet path through the filters Create your own chains Proxies WWW Proxy (Squid) Cryptography SSLwrap SSH and SCP SSH Tunnelling Spoofing Obtaining information about the owner of the IP address and domain Alert the authorities of a breach of the law
dnsandbind DNS and BIND: Setting up, managing, and securing your DNS server 14 hours DNS (domain name system) is the "phone book" of the internet, providing a directory of computer names and their IP addresses. BIND is the most common Linux implementation of DNS. When you open a website or send and receive an email, a DNS server somewhere is quietly addressing your message to its intended recipient. In this training, participants will learn the critical features of DNS while carrying out exercises in the setup and configuration of a BIND DNS server on Linux. The course starts with a refresher on key networking principles, then digs into hands-on practice with setup and configuration. Steadily, the discussion and exercises move towards more complex topics such as security, availability, debugging and troubleshooting. Audience     Network technicians     Network designers     System administrators Format of the course     Part lecture, part discussion, heavy hands-on practice and implementation, occasional quizing to measure progress Introduction How DNS works Different types of name servers Installing BIND Configuring BIND Creating Zones DNS server and email Configuring your hosts Maintaining BIND Adding name servers Parents and sub-domains Securing your name server Stealth configurations Load balancing and failover Deploying IPv6 Supporting international domain names DNS and DHCP Dynamic DNS Interoperability and upgrading Debugging your name server Troubleshooting tools and techniques Closing remarks
bashp1 BASH Programming 14 hours The course answers questions: How does the shell works? How to write programs in a shell? The simplest script Choosing the shell (magic number #!, Sha-bang) Calling the script External and built-in commands Some special characters Comment (#) End of Line (;) An empty statement (:) Redirection of input output (>, <, >>) Redirecting output Redirection of input Stream (|) Start the process in the background (&) Variables and Parameters Destruction of variables (unset) Variable with a null value Save the result to a variable (backquotes ``) Parameters request ($ 0, $ #, $ 1, $ 2, $ 3 ...) Manual shift Quoting. Escape character (\) Regular Expressions Conditional statements The if / then The if / then / else Nesting if statements The if / elif case statement Operators Operators and, or (&&, | |) test command Completing scrypt The exit statement Use the status of completion of the program in a script ($?) Tests and Operators Operators text file Tests the file type Test file attributes Comparison operators Comparing arithmetic using the command if Integer comparison operators Comparing strings Comparing the complex (and, or) Nesting comparison operators The assignment operator Arithmetic operators Operators operations on bits (bitwise operators) Logical operators Numeric constants Loopa The loop for / in The command seq The while loop Loop until Controlling the loop (break, continue) Text Processing Command head, tail Sort, Uniq, Expand, Unexpand Cut, Paste, Join, Wc,Tr Text search (grep) Stream Editor (sed) Interactive programs Read command User select Features Sleep command If the script does not work? (debugging)
kshprog Korn Shell Programming 21 hours UNIX is a true multitasking operating system. Its portability, reliability and efficiency has helped it and various flavours of it, become widely used for a range of applications. This course is designed for those wishing to learn Korn Shell programming. The practical exercises constitute about 50% of the course time. The course is suitable for any variant of Unix and the Linux platform is used for course delivery. Who Should Attend: Programmers, system administrators and technical support staff who need to become proficient at scripting in the Unix environment. Introduction UNIX Shells Comparing Shells Scripting Shell script basics Comments Printing output Quoting Creating shell variables Predefined shell variables Environment variables Dot scripts Aliases Positional parameters Command substitution Conditional statements If statement Extended if syntax Comparison operators Looping statements While statement Until statement Iterating for loop Break and continue Mathematics Let statement Arithmetic command Arithmetic value command Counting for loop C Mathematics Variables String length Substrings Deleting leading and training strings Providing default values Shell IO File descriptors Redirecting input and output Inline documents Opening file descriptors Reading and writing file descriptors Closing and moving file descriptors Functions Function definitions POSIX functions Positional parameters Returning a value Local and reference variables Signal Handling UNIX Signals Sending signals The trap statement User Input Using getopts The select statement Applications Hiding parameters Database Queries
dockeradm1 Docker for Developers and System Administrators 14 hours Docker is a platform for developers and sysadmins to maintain distributed applications. It consists of a runtime to run containers and a service for sharing containers. With docker the same app can run unchanged on laptops, dedicated servers and virtual servers. This course teaches the basic usage of Docker, useful both for developers and system administrators. The course includes a lot of hands on exercises and the participants will practice in their own Docker environment and build their own Docker images during the 2 days. What is Docker? Use cases Major components of Docker Docker architecture fundamentals Docker architecture Docker images Docker registry Docker containers The underlying technology Namespaces Control groups Union FS Container format Installation of Docker Installation on Ubuntu via apt-get installation of newer version of Docker Dockerizing applications The hello world example Interactive container Daemonizing programs Container usage Running a webapp in a container Investigating a container Port mapping Viewing the logs Looking at processes Stopping and restarting Removing a container Managing images Listing images Downloading images Finding images Networking of containers Port mapping details Container linking and naming Linking and environment variables Data in containers Data volumes Host directories as data volume Host file as data volume Data volume containers Backup, restore of data volumes Contributing to the ecosystem What is Docker Hub? Registering on Docker Hub Command line login Uploading to Docker Hub Private repositories Automated builds
debianadmin Debian Administration 35 hours This is a comprehensive training course for administering Debian GNU/Linux operating system. It is always delivered on the current version of Debian. Debian Distribution What is Debian? Choosing Debian version Debian support and help Debian community Console basics The shell prompt The shell prompt under X The root account and root shell prompt (su, sudo, running programs as root under X) GUI system administration tools Virtual consoles How to leave the command prompt How to shutdown the system Recovering a sane console Additional package suggestions for the newbie An extra user account sudo configuration The filesystem Filesystem permissions Control of permissions for newly created files: umask Permissions for groups of users (group) Timestamps Links Named pipes (FIFOs) Sockets Device files Special device files procfs and sysfs Midnight Commander (MC) Customization of MC Starting MC File manager in MC Command-line tricks in MC The internal editor in MC The internal viewer in MC Auto-start features of MC FTP virtual filesystem of MC The basic Unix-like work environment The login shell Customizing bash Special key strokes The pager Setting a default text editor How to quit vim Recording the shell activities Basic Unix commands The simple shell command Command execution and environment variable "$LANG" variable "$PATH" variable "$HOME" variable Command line options Shell glob Return value of the command Typical command sequences and shell redirection Command alias Unix-like text processing Unix text tools Regular expressions Replacement expressions Global substitution with regular expressions Extracting data from text file table Script snippets for piping commands Debian package management Debian package management prerequisites Package configuration Basic precautions Life with eternal upgrades Debian archive basics Package dependencies The event flow of the package management First response to package management troubles Basic package management operations apt-get/apt-cachevs.aptitude Basic package management operations with the commandline Interactive use of aptitude Key bindings of aptitude Package views under aptitude Search method options with aptitude The aptitude regex formula Dependency resolution of aptitude Package activity logs Examples of aptitude operations Listing packages with regex matching on package names Browsing with the regex matching Purging removed packages for good Tidying auto/manual install status System wide upgrade Advanced package management operations Advanced package management operations with commandline Verification of installed package files Safeguarding for package problems Searching on the package meta data Debian package management internals Archive meta data Top level "Release" file and authenticity Archive level "Release" files Fetching of the meta data for the package The package state for APT The package state for aptitude Local copies of the fetched packages Debian package file names The dpkg command The update-alternative command The dpkg-statoverride command The dpkg-divert command Recovery from a broken system Incompatibility with old user configuration Different packages with overlapped files Fixing broken package script Rescue with the dpkg command Recovering package selection data Tips for the package management How to pick Debian packages Packages from mixed source of archives Tweaking candidate version Updates and Backports Automatic download and upgrade of packages Limiting download bandwidth for APT Emergency downgrading Who uploaded the package? The equivs package Porting a package to the stable system Proxy server for APT Small public package archive Recording and copying system configuration Converting or installing an alien binary package Extracting package without dpkg More readings for the package management The system initialization An overview of the boot strap process BIOS, boot loader, mini-Debian system The meaning of the runlevel The configuration of the runlevel The runlevel management example The default parameter for each init script The hostname The filesystem Network interface initialization Network service initialization The system message The kernel message The udev system The kernel module initialization Authentication and Security Normal Unix authentication Managing account and password information Good password Creating encrypted password PAM and NSS Configuration files accessed by the PAM and NSS The modern centralized system management "Why GNU su does not support the wheel group" Stricter password rule Other access controls sudo SELinux, Apparmor Restricting access to some server services Security of authentication Secure password over the Internet Secure Shell Extra security measures for the Internet Securing the root password Network setup The basic network infrastructure The domain name The hostname resolution The network interface name The network address range for the LAN The network device support The modern network configuration for desktop GUI network configuration tools The low level network configuration Iproute2 commands Safe low level network operations Network optimization Finding optimal MTU Setting MTU WAN TCP optimization Netfilter infrastructure Network applications The mail system Modern mail service basics The mail configuration strategy for workstation Mail transport agent (MTA) and Mail user agent (MUA) Overview of exim4 Basic MUA- Mutt Mail delivery agent (MDA) with filter maildrop configuration procmail configuration Redeliver mbox contents POP3/IMAP4 server The remote access server and utility (SSH) Basics of SSH Port forwarding for SMTP/POP3 tunneling Connecting without remote passwords Dealing with alien SSH clients Setting up ssh-agent How to shutdown the remote system on SSH Troubleshooting SSH Other network application servers Other network application clients The diagnosis of the system daemons The X Window System Setting up desktop environment The server/client relationship The X server Starting the X Window System Starting X session with gdm Customizing the X session (classic method) Customizing the X session (new method) Connecting a remote X client via SSH Secure X terminal via the Internet X applications X office applications X utility applications System tips The screen program The use scenario for screen(1) Key bindings for the screen command Data recording and presentation The log daemon Log analyzer Recording the shell activities cleanly Customized display of text data Customized display of time and date Colorized shell echo Colorized commands Recording the editor activities for complex repeats Recording the graphic image of an X application Recording changes in configuration files Data storage tips Disk partition configuration Accessing partition using UUID Filesystem configuration Filesystem creation and integrity check Optimization of filesystem by mount options Optimization of filesystem via superblock Optimization of hard disk Using SMART to predict hard disk failure Expansion of usable storage space via LVM Expansion of usable storage space by mounting another partition Expansion of usable storage space using symlink Expansion of usable storage space using aufs Data encryption tips Removable disk encryption with dm-crypt/LUKS Encrypted swap partition with dm-crypt Automatically encrypting files with eCryptfs Automatically mounting eCryptfs Monitoring, controlling, and starting program activities Timing a process The scheduling priority The ps command The top command Listing files opened by a process Tracing program activities Identification of processes using files or sockets Repeating a command with a constant interval Repeating a command looping over files Starting a program from GUI Customizing program to be started Killing a process Scheduling tasks once Scheduling tasks regularly Alt-SysRq key System maintenance tips Who is on the system? Warning everyone Hardware identification Hardware configuration System and hardware time The terminal configuration The sound infrastructure Disabling the screen saver Disabling beep sounds Memory usage System security and integrity check The kernel Kernel parameters Kernel headers Compiling the kernel and related modules Compiling the kernel source: Debian standard method Compiling the module source: Debian standard method Non-free hardware drivers Virtualized system Virtualization tools Virtualization work flow Mounting the virtual disk image file Chroot system Multiple desktop systems Data management Sharing, copying, and archiving Archive and compression tools Copy and synchronization tools Idioms for the archive Idioms for the copy Idioms for the selection of files Backup and recovery Backup utility suites An example script for the system backup A copy script for the data backup Removable storage device Sharing data via network Archive media The binary data Viewing and editing binary data Manipulating files without mounting disk Data redundancy Data file recovery and forensic analysis Splitting a large file into small files Clearing file contents Dummy files Erasing an entire hard disk Erasing unused area of an hard disk Undeleting deleted but still open files Searching all hardlinks Invisible disk space consumption Data security infrastructure Key management for GnuPG (signing and encrypting) The MD5 sum
sambadv Samba 14 hours Samba is an Open Source / Free Software suite that provides file and print services to all manner of SMB/CIFS clients, including Linux and the numerous versions of Microsoft Windows operating systems. Audience This course is suitable for developers and engineers who work with preexisting Samba instances, or who intend to integrate Samba into their work flow. No two courses are delivered the same. Each course is tailored to your specific requirements. Installation Installing Samba from packages Installing Samba from source Upgrading Samba Standalone server File Sharing How POSIX permissions map to Windows permissions Differences between POSIX and Windows ACLs Print Serving Password Storage Samba VFS (Virtual File System) modules Recycle bin Antivirus integration Backup and restore Performance tuning Domain membership What makes Samba a domain member Available ID mapping backends NSS service PAM authentication Coexistence with NFS Domain control What makes Samba a domain controller Services and ports involved in Domain Control Setting up Samba as an Active Directory Domain Controller Joining an additional Samba DC to an existing Active Directory The AD functional levels Storing Windows profiles and logon scripts Authenticating other services against Samba AD Setting up RFC2307 in AD Replication Distributed File System (DFS) Directory Replication Service (DRS)
lcsmcentos Linux Cluster and Storage Management on CentOS 6 & 7 35 hours Created Linux Administrators and developers who are interested with getting involved in Clustering or require knowledge of Clustering based on Linux system. Even beginners, who have the basic skill and knowledge on Linux, can catch up with this course just if you follow the instructor's lab and explanation in detail. This course is intended to practice enough clustering technology and to show it is very easy to understand the clustering technology on Linux system. This course will be delivered to audience with 40% lectures, 50% labs and 10% Q&A. This five-day course strongly emphasizes lab-based activities. You'll learn how to deploy and manage shared storage and server clusters that provide highly available network services to a mission-critical enterprise environment. It can be deliver on any distribution (CentOS and Ubuntu are commonly used) This course covers these kinds of topics: Chapter 01 Linux Cluster Introduction Chapter 02 Data Storage and Cluster Configuration Considerations Chapter 03 iSCSI Configuration Chapter 04 Device Mapper and Multipath Chapter 05 Linux Cluster Configuration with Conga Chapter 06 Linux Cluster Configuration with CCS Chapter 07 Fencing and Failover Domain Chapter 08 Quorum and Quorum Disk Chapter 09 Cluster Logical Volume Management Chapter 10 Global File System 2 Chapter 11 Samba Cluster Chapter 12 Apache Cluster with Conga and CCS Chapter 13 Database Cluster with MySQL Chapter 14 Linux Cluster using Pacemaker Chapter 15 Apache Cluster using Pacemaker Chapter 16 Linux Cluster using PCSD Web UI Chapter 17 Database Cluster with MariaDB
ulshscr UNIX/Linux Shell Scripting 14 hours This 2 day course gives an introduction to the writing of UNIX Shell scripts using the Korn and Bash shells and to the more advanced features of UNIX including the batch editor sed and the text file processing language awk. Although based on the Solaris version of UNIX running on a desktop PC, the principles learnt may be applied to all other versions of UNIX including Linux, AIX, HP-UX and SCO. The course takes the format of a workshop, with a mix of lecture, working examples and practical exercises. Although the content may be customised, at least 1 day is normally needed to cover the core elements. Full course notes are provided along with sample script files and free software tools for use in accessing a UNIX server. Introduction Objectives Course Schedule Course Introductions Pre-requisites Bibliography Delegate Responsibilities Course Summary Review of Basics - optional Files Directories and Processes Displaying Directories - ls Getting Help - man Displaying Files - cat, more Simple Commands Piping - using | symbol Redirection - using > symbol Redirection - using >> symbol Redirecting Input - using < symbol Redirecting Errors Using /dev/null Foreground Jobs Background Jobs - & Stopping Jobs - kill Special Files - . and .. The Command Prompt - PS1 Creating Aliases Using Aliases Command history Command Line Edit - using Arrow Keys Command Line Edit - using vi Customising the Shell The Home Directory - HOME The Working Directory - pwd Changing Directories - cd Make Directory - mkdir Remove Directory - rmdir Interactive Copy - cp -i Interactive Move - mv -i Interactive Remove - rm -i Removing Directories - rm -r Wild Cards - File Name Generation Word count - wc Finding Files - find Finding Text in Files - grep, sort, cut, uniq, tr Changing Permissions - chmod Shell Programming Creating Shell Scripts Testing the Command Creating the Script File Adding Execute Permissions Testing the Script Running the Script - time Running the Script - dot Running the Script - exec Running the Script - ksh Debugging the Script Passing Parameters The read Command Using read in Scripts Choosing the Shell Tidying The Output Suppressing Input - stty Special Characters and Variables Quotation Marks Quoted Strings - ", ' Escape Character - * Quoted Strings - ` Using $(...) System Variables - set Other Special Variables User Variables User Variables - unset Variables in Scripts Typeset Command Integer Variables Special Constructs Creating Menus Conditions - case Creating a Menu Iteration - while, until Holding the Output - sleep Holding the Output - dummy read Ending the Script Ending the Loop Hidden Option - forking a shell Trapping Interrupts - trap More on Interrupts Highlighting Text- tput Positioning the Cursor - backtab \b Korn Shell Menu Selection Conditional Testing Testing File Attributes Testing File Permissions Multiple Tests - Nested ifs Multiple Tests - elseif The NOT Condition Multiple Conditions in One Test Testing Strings Using Square Brackets Avoiding Null Input Testing Numbers More on case Displaying Variables Placing Spaces Testing Commands Iteration, Looping Computations - let Iteration - while, until Infinite Loop Iteration - for More than 9 Parameters - shift Sub-scripts and Functions Local and Global Variables Sub-scripts Export Command Exit Status Aliases Functions Useful Functions Return Status Manipulating Functions Functions in Scripts Advanced Commands Debugging - set Setting - set Merging Files - join Merging Files - paste, basename and dirname Job Control - jobs Regular Expressions Global Regular Expression Printer - grep Expression grep - egrep Fast grep - fgrep Computations - expr Computations – bc, eval Command, Argument Processing getopts Command Using Arrays Advanced Edit – vi & sed vi - Mapping Key Combinations Mapping Control Keys Using Abbreviations Editing Many Files Regular Expressions Global Insert Here document, Batch Stream Editor - sed, sed delete, -d, sed print, -p, sed suppress, -n, sed quit, -q, sed file, -f, sed Multiple Input, sed Find and Replace sed Example Text File Processing - awk The awk Programming Tool Pattern Matching Regular Expressions Comparison Patterns Compound Patterns Range Patterns Special Patterns Built-in Functions Troubleshooting awk Scripts Passing Parameters Using Contains printf Function Computations Functions substr length Action Statements Control Flow Statements Arrays Arrays with for Loops awk Examples
compforelinx Computer forensics with Linux 21 hours Introduction Installation and configuration of Linux environment File system layout and system management Security concepts Data acquisition Accessing devices, partitions and file systems Identification of disks and partitions Creating a forensic image of the disk Forensic file formats for image data Working with disk images The analysis Using command-line utilities File search concepts Data carving tools Advanced Handling large disks Compression and encryption
ubtdt Ubuntu Desktop 7 hours This course has been prepared for people who want to know how to use Ubuntu Desktop for everyday work. This course explains how to manage your files, install and configure your devices, send emails, browse internet and use the full power of GNU/Linux operating system. Linux, Distributions and Ubuntu What is Linux? What is Ubuntu? What versions of Ubuntu are available? Is Ubuntu free? Know your Environment, Gnome Configuring Appearance Visual Effects with Ubuntu Input devices settings Sound configuration Network configuration Monitoring your resources Reading Log files Installing and Removing Software Browsing staggering catalogue of applications Installing software Upgrading selected application Removing software Upgrading the system Upgrading distribution Sharing Desktop with Others Vino and other VNC clients and servers Remote control of your computer OpenOffice Editing documents with OpenOffice writer Using OpenOffice Calc Note taking through Tomboy Emails, Calendars, Contacts and Tasks Using Evolution Configuring email settings Creating calendars Using Web Calendars (Like Google Calendar, Ical, WebDav, etc...) Synchronizing your emails and calendar with mobile devices Instant messaging with Pidgin IM WebBrowsing Configuring Firefox Bookmarks and history Spell checker Add-ons and plug-ins Photos and Images Organizing your images with F-spot manager Editing pictures with Gimp Music and Video Playing DVD's Access (truly) free music store DRM and Ubuntu Running Windows Applications Using windows emulator (wine) to run your Windows applications How to run Windows inside Linux
linuxadmfun Linux Administration Fundamentals 21 hours Learn core Linux Systems Administration skills in a workshop environment. (Ubuntu or CentOS) Who is this course for: Engineers who want to transition into Linux engineering and administration roles. Beginners who want to understand how a Linux operating system works and how to manage it. People looking to prepare for professional certifications such as the LPI level 1 or RHCSA. Description: This course is designed to teach you about the advantages of Linux-based operating systems, their role in enterprise, and how to understand and administer them. Aimed at relative beginners, we will teach you all of the skills necessary to manage a small Linux estate. Using a combination of demonstrations and practical exercises, we will guide you through the relevant commands, tools and processes you will need to know to become a successful administrator of a professional Linux environment. The skills to properly run and maintain Linux environments are in very high demand. If you have little or no experience working with Linux and wish to become a competent administrator quickly, this course will give you all of the tools you need to enter the exciting and challenging world of Linux administration. At the end of this course you will: Understand what GNU/Linux is, and its role in modern IT Be able to install a linux distribution from scratch Be able to configure users, groups, storage, and networking of a Linux-based computer Be able to confidently navigate the command line interface (CLI) on any Linux server Understand services, processes, and system resources Install, remove, and configure software Introduction to GNU/Linux distributions Installing a Linux-based operating system Desktop Environments System management with the bash shell Common tools File and Directory Management Processes and Services Storage Configuration Package Management Basic Networking User Management Advanced bash Getting Help
ubtsvr Ubuntu Server Overview 7 hours This course has been created for managers, system architects, existing Unix or Windows administrators or anyone who wants to know what Ubuntu Server operating system has to offer. This course in most cases answers the question WHAT Ubuntu Server can do for you, rather than HOW to do things. If you are interested in the HOW question then please have a look at our Administration of Linux System training course. This course always covers the newest release of Ubuntu. Ubuntu Server Edition Ubuntu versions Available support TLS and standard edition Maintenance policy and life cycle Ubuntu and Hardware Checking compatibility with Ubuntu Available kernels and supported architectures Package Management Dpkg and apt-get Available sources Adding new sources Alternative packet management systems (RPM, Yums, etc...) and dependencies Aptitude Automatic Updates Distribution Upgrades Networking Network Configuration TCP/IP, IPv4 and IPv6 Dynamic Host Configuration Protocol (DHCP) Time Synchronisation with NTP Remote Administration OpenSSH Server eBoxNetwork Authentication OpenLDAP Server Samba and LDAP Kerberos Domain Name Service (DNS) Configuration Security User Management Console Security Firewall AppArmor Certificates Web Servers HTTPD - Apache2 Web Server PHP5 - Scripting Language Squid - Proxy Server Ruby on Rails Apache Tomcat Databases MySQL PostgreSQL Wiki Applications Moin Moin MediaWiki File Servers FTP Server Network File System (NFS) CUPS - Print Server Email Services Postfix Exim4 Dovecot Server Mailman Mail Filtering Version Control System Bazaar Subversion CVS Server Mercurial GIT Windows Networking Samba File Server Samba Print Server Securing a Samba File and Print Server Samba as a Domain Controller Samba Active Directory Integration Likewise Open Backups Shell Scripts Archive Rotation Bacula Virtualization and Cloud Computing libvirt JeOS and vmbuilder Quemu and KVM VirtualBox VMware EC2 Eucalyptus Other Keeping /etc under Version Control System Block Device Replication
elnxint Introduction to Embedded Linux (Hands-on training) 14 hours This is a two day course covering all basic principles of building Embedded linux Systems, around 60% of the entire course time is practical hands-on implementation for real world application using the same standards and tools used in industry Brief history of linux Open source development overview Introduction to embedded linux Cross development | Boot Loaders Building custom embedded linux system for a typical hardware target (SAM9M10-G45-EK) Embedded Linux Tools Introduction to Build Systems Embedded Linux application development and debugging
lpic1-101 Linux LPI LPIC-1 Exam 101 Preparation 14 hours This course has been created for someone preparing for the LPI certification 101 Exam. It is conducted as a series of lectures intertwined with simple exercises. System Architecture Determine and configure hardware settings Boot the system Change runlevels and shutdown or reboot system Linux Installation and Package Management Design hard disk layout Install a boot manager Manage shared libraries Use Debian package management Use RPM and YUM package management GNU and Unix Commands Work on the command line Process text streams using filters Perform basic file management Use streams, pipes and redirects Create, monitor and kill processes Modify process execution priorities Search text files using regular expressions Perform basic file editing operations using vi Devices, Linux Filesystems, Filesystem Hierarchy Standard Create partitions and filesystems Maintain the integrity of filesystems Control mounting and unmounting of filesystems Manage disk quotas Manage file permissions and ownership Create and change hard and symbolic links Find system files and place files in the correct location
elkdd Embedded Linux Kernel and Driver Development 14 hours A two day course around 60% hands-on labs focusing on Embedded linux kernel internals and development and investigating how to write several types of device drivers What is the Linux kernel? Getting Kernel source code Configuring, compiling and booting the kernel Linux kernel modules Character device drivers Using Git for sourcce code management
lpic2-201 Linux LPI LPIC-2 Exam 201 Preparation 14 hours This course has been created for someone preparing for LPI certification. It is conducted as a series of lectures intertwined with simple exercises. Linux Kernel Kernel Components Compiling a kernel Patching a kernel Customise, build and install a custom kernel and kernel modules Manage, Query kernel and kernel modules at runtime System Startup Customising system startup and boot processes System recovery Filesystem and Devices Operating the Linux filesystem Maintaining a Linux filesystem Creating and configuring filesystem options udev Device Management Advanced Storage Device Administration Configuring RAID Adjusting Storage Device Access Logical Volume Manager Networking Configuration Basic networking configuration Advanced Network Configuration and Troubleshooting Troubleshooting network issues Notify users on system-related issues System Maintenance Make and install programs from source Backup operations Domain Name Server Basic DNS server configuration Create and maintain DNS zones Securing a DNS server
lnxnetp Linux Network Programming 14 hours This course is addressed to junior software developers. After the course completion, the trainees will be able to understand the architecture of well-known web servers such as Apache or Nginx, and implement their own network programs. The course is 67% lectures, 33% hands-on exercises. Sockets Creating datagram sockets Receiving and sending data Creating and accepting TCP connections Closing sockets Handling errors Handling more than one client in a simple way Prefork model, as found in Apache Forking a new process per client Cleaning up after finished processes Threads Inetd, systemd units Waiting for data Blocking sockets Non-blocking sockets and select Select as a way to wait for "any of these sockets" Organizing reads and writes Dealing with short reads and writes Reading up to a delimiter Pipelined requests Application-level buffers Event-driven architecture Using select for multiplexing all client connections in one thread State machines Callback hell Event libraries "Green" threads Problem of 10000 connections Problems with prefork model and select-based loop poll as an alternative to select Realtime signals and why you shouldn't use them Epoll (linux) and kqueue (BSD) Why and when epoll and kqueue are faster than poll/select Timeouts and timers SIGALARM Timeout as a select argument A simple case of all-equal timeouts Priority queue as an abstract data stracture Binary heap as a priority queue implementation Timer wheel timerfd Integration with the operating system Traditional daemons Systemd socket activation Logging Handling signals Performance and scalability optimizations Choosing the right architecture Setting socket options  
lpic1-102 Linux LPI LPIC-1 Exam 102 Preparation 14 hours This course has been created for someone preparing for the LPI certification 102 Exam. It is conducted as a series of lectures intertwined with simple exercises. Shells, Scripting and Data Management Customize and use the shell environment Customize or write simple scripts SQL data management User Interfaces and Desktops Install and configure X Setup a display manager Accessibility Administrative Tasks Manage user and group accounts and related system files Automate system administration tasks by scheduling jobs Localisation and internationalisation Essential System Services Maintain system time System logging Mail Transfer Agent (MTA) basics Manage printers and printing Networking Fundamentals Fundamentals of internet protocols Basic network configuration Basic network troubleshooting Configure client side DNS Security Perform security administration tasks Setup host security Securing data with encryption
lxcintro Introduction to Linux Containers (LXC) 7 hours This course is addressed to Linux professionals (developers and system administrators) as a first introduction to container technologies. The course may also be interesting to people who are already familiar with Docker and want something else to compare it with. It is presented as a lecture with demonstrations that you can follow along on your Linux laptop. Use cases for virtualization and containers Kernel-level technologies that make containers work How to choose between virtual machines and containers Comparison of container technologies for Linux Installation of LXC Creating, cloning, starting and stopping containers Networking in containers Managing storage for containers Limiting resources accessible to a container Security considerations Unprivileged containers and UID/GID mapping Tools for container management Areas of current development: LXD, CRIU
lpic2-202 Linux LPI LPIC-2 Exam 202 Preparation 14 hours This course has been created for someone preparing for LPI certification. It is conducted as a series of lectures intertwined with simple exercises. Web Services Implementing a web server Maintaining a web server Implementing a proxy server File Sharing SAMBA Server Configuration NFS Server Configuration E-Mail Services Using e-mail servers Managing Local E-Mail Delivery Managing Remote E-Mail Delivery System Security Configuring a router Securing FTP servers Secure shell (SSH) TCP Wrapper Security tasks Troubleshooting Identifying boot stages and troubleshooting bootloaders General troubleshooting Troubleshooting system resources Troubleshooting environment configurations
linuxha Highly Available Services with DRBD and Pacemaker 7 hours The primary objective of this practical course is to introduce the Linux high-availability stack (Pacemaker, DRBD) to system administrators. During the training, each participant will build a two-machine cluster that offers a simple highly-available service (such as PostgreSQL or NFS) on a virtual IP address. Also, uses of DRBD not related to high availability are considered. DRBD basics Theory of operation Installation Supported replication modes and their use cases Creation of a two-node single-primary cluster Manual failover Recovering from split-brain Corosync Installation and initial configuration Pacemaker Theory of operation Installation Role of STONITH devices Configuration of resource agents DRBD Mounted filesystem Virtual IP address LSB and systemd services Groups, ordering and colocation constraints DRBD in Dual-Primary mode Use with OCFS2 Advanced topic: root filesystem on DRBD
linuxsysadmin1 Linux System Administration 28 hours Audience: System administrators who need to quickly learn core Enterprise Linux proficiencies System administrators, network administrators, and other IT professionals who require proficiency performing administration tasks in Linux IT professionals on the path to becoming a Linux system administrator Overview: This Linux Administrator training course is designed for IT professionals who are new to Linux and require core Administrator skills. This course will feature GUI based tools and introduce command line concepts to provide a solid foundation for someone planning to become a Linux Administrator. The objectives are that by the end of the 4 day course you will be able to perform installation, manage physical storage, establish network connectivity and perform security administration. Establish Network Connectivity Configure, manage, and test static network settings Administer Users and Groups Implement password aging and configure an LDAP client Monitor System Resources Manage CPU, memory, and disk utilization; manage system logs Manage System Software Install software and query with yum using RHN and a custom repository Deploy Network Services Deploy VNC, FTP, and web services and require key authentication with SSH Secure Filesystems and Network Services Restrict file access with ACLs and secure network services with a firewall and SELinux Manage Physical Storage Manage encrypted partitions, filesystems, and swap space Manage Logical Volumes Understand Logical Volume concepts and manage Logical Volumes, including snapshots Control the Boot Process Understand runlevels and manage GRUB Tune and Maintain the Kernel Pass parameters to the kernel and manage kernel modules Automate Installation with Kickstart Create kickstart configurations and use them to install Linux Manage Virtual Machines Deploy and manage KVM virtual machines Troubleshoot System Problems Apply a systematic approach to diagnosing and correcting system failures Research Red Hat Resources
dnswebmaildb Top 4 Linux/Unix Servers - DNS,Web,Mail and Database 35 hours Created Linux/Unix Administrators and developers who are interested with getting involved in LInux/Unix Servers Even beginners, who have the basic skill and knowledge on Linux, can catch up with this course just if you follow the instructor's lab and explanation in detail. This course is intended to practice enough Managing Linux Servers and to show it is very easy to understand Linux/Unix servers. This course will be delivered to audience with 40% lectures, 50% labs and 10% Q&A. This five-day course strongly emphasizes lab-based activities. You'll learn how to deploy and manage Top 4 Linux Servers that provide highly useful network services to a mission-critical enterprise environment. It can be deliver on any distribution (Fedora, CentOS are commonly used) This course covers these kinds of topics: Bind as a ;DNS server Apache as a Web Server Postfix as a Mail Server MariaDB as a Database Server Through this course, you will learn from the installation to High level features of each server.
linuxsysadmin Administration of Linux System 21 hours How to administer the system? How to build a Linux system? The system initialization (grub, kernel, init daemons, shell) How to manage user accounts? How to create and manage devices? How to create back up? The tasks of the system administrator What is Linux? Procedures for starting and closing of the system The process of loading and starting the operating system The closure of the system Restart Single user mode The init program Init as the ancestor of all processes Configuring init - / etc / inittab Run levels Login to the system Login via terminal Login via network What exactly does the program login? Access control Starting coatings User Management What is a user account? Account types Creating a User Manipulation of the groups Changing the account properties Deleting user Temporarily disable your account Get information about accounts Memory Management What is virtual memory? Create a file / swap partition The use of swap space Sharing swap partitions with other operating systems Buffering Managing file systems Types of devices Partitions and file systems Metadata Create a partition Applying a Filesystem Checking integrity File management devices MAKEDEV script Mknod command CRON Configuring the cron service Monitoring system The term consumption of resources and activities Research what operations are performed in the given time different programs Monitoring system activity - SADC The allocation of resources Limitation of resources allocated to the individual user - The allocation of disk space - QUOTA Analysis and configuration of system logs - syslog Automatic rotation files of records - logrotate Create Backing up Situations in which we may lose data Strategies of backup copies Full backup Differential backup Incremental Backup
qemukvm Virtualization with QEMU, KVM and Libvirt 14 hours This practical course contains topics addressed to system administrators, developers, embedded developers and ordinary desktop users (including managers) who would like to have an introduction to virtualization in general. After this course, administrators will be able to create private clouds for use in production, and developers will be able to test their code on multiple operating systems without needing a second PC or a non-x86 board. We understand that the set of topics presented in this course covered a wide range of subjects that might not be applicable for all customers. When booking this course, please specify what you wish to achieve using QEMU or KVM, and we will customize it by reallocating time from less relevant topics to the ones that would be important for you. Day 1 "Big picture" of the virtualization ecosystem History of QEMU development CPU features related to virtualization Installing QEMU from packages Installing QEMU from source Full-system emulators Using the QEMU console Available machine types and peripheral devices VirtIO Guest drivers Disk image formats Managing virtual machine snapshots Networking in virtual machines Graphics adapters Audio devices Nested virtualization Day 2 User-level emulators Registration of foreign binaries through binfmt-misc Cross-architecture chroots and containers The role of Libvirt in the virtualization ecosystem Supported hypervisors and container technologies QEMU Machine protocol (QMP) Running QEMU headless QXL video card and SPICE display Available SPICE viewers Creating virtual machines with "virt-install" and "virt-clone" command-line tools Using "virt-manager" graphical application to create and run virtual machines Editing virtual machine configuration and libvirt settings with "virsh" low-level tool Using libguestfs tools (guestfish, virt-sysprep) to manipulate disk image contents Networking and firewall in libvirt Accessing libvirt remotely Overview of web-based frontends for libvirt Bonus topics available in classroom only (i.e. only short descriptions, not demonstrations, are available in remote courses): Running Mac OS X in KVM (if at least one participant has a Mac with Linux installed) 3D graphics with VirGL 3D graphics with Intel Broadwell or Skylake GPU and igvtg (very experimental, requires custom kernel, may or may not work) Video card passthrough (if there is a desktop available with two video cards) USB device pass-through

Upcoming Courses

CourseCourse DateCourse Price [Remote / Classroom]
Korn Shell Programming - 深圳 - 新世界中心Wed, 2017-05-10 09:30¥29820 / ¥36990
Computer forensics with Linux - 北京 - 侨福芳草地Wed, 2017-05-10 09:30¥29400 / ¥33600

Other regions

Weekend Linux courses, Evening Linux training, Linux boot camp, Linux instructor-led , Linux coaching, Linux private courses, Linux one on one training , Evening Linux courses, Linux on-site, Linux instructor, Linux trainer ,Weekend Linux training, Linux classes

Course Discounts

Course Discounts Newsletter

We respect the privacy of your email address. We will not pass on or sell your address to others.
You can always change your preferences or unsubscribe completely.

Some of our clients