وب سایت تخصصی شرکت فرین
دسته بندی دوره ها
5

LPI Linux Essentials Online Training

سرفصل های دوره

1.Linux Evolution and Popular Operating Systems
  • 1.Intro1C30C
  • 2.The Function of an Operating System1C30C
  • 3.The History of Linux1C30C
  • 4.Comparing Windows and Linux1C30C
  • 5.Why Use Linux 1C30C
  • 6.Linux Distributions1C30C
  • 7.Alternative Linux Distributions1C30C
  • 8.Validation1C30C

  • 2.Linux Software Packages
  • 1.Introduction1C30C
  • 2.Open Source Apps Programming Server and Administration1C30C
  • 3.1C30C
  • 4.Major Open Source Apps Desktop and Mobile1C30C
  • 5.Install Software via GUI apt and dnf1C30C
  • 6.Uninstall Software1C30C
  • 7.Open Source Software and Licensing1C30C

  • 3.Getting to the Command Line and Desktop Skills
  • 1.Linux Interface - Command Line1C30C
  • 2.Linux Desktop Environment - Overview1C30C
  • 3.Linux Desktop Environment - GNOME and KDE Plasma1C30C
  • 4.Linux Desktop Environment - Linux Mint Cinnamon1C30C
  • 5.1C30C
  • 6.Validation1C30C

  • 4.ITC Skills and Working in Linux
  • 1.Linux in Daily Life and Industry1C30C
  • 2.Linux in the Server Room and on the Desktop1C30C
  • 3.IaaS PaaS and SaaS1C30C
  • 4.Virtualize Servers1C30C
  • 5.Virtualize Desktops1C30C
  • 6.Install Virtualization Software and Guests1C30C
  • 7.Validation1C30C

  • 5.Linux Privacy and Security
  • 1.Introduction1C30C
  • 2.Internet Cookies and Privacy1C30C
  • 3.Choose Strong Passwords1C30C
  • 4.Encryption What Do We Need to Protect 1C30C
  • 5.Using Certificates to Encrypt and Sign1C30C
  • 6.Encryption Cant Help you Here1C30C
  • 7.Encryption Tools and Demo1C30C
  • 8.Validation1C30C

  • 6.Finding Your Way on a Linux System
  • 1.Command Line Basics Overview1C30C
  • 2.1C30C
  • 3.Command Line Basics Demo1C30C
  • 4.1C30C
  • 5.Local and Environment Variables1C30C
  • 6.Getting Help From the Command Line1C30C

  • 7.Managing Directories and Files
  • 1.Using Directories Overview1C30C
  • 2.Using Directories Demo1C30C
  • 3.Advanced ls Options1C30C
  • 4.Creating Managing and Deleting Files1C30C
  • 5.Validation1C30C

  • 8.Archiving Files on the Command Line
  • 1.Archiving1C30C
  • 2.Compression1C30C
  • 3.Archive and Compression Tools1C30C
  • 4.Archive and Compression Commands1C30C
  • 5.Archive Demonstration1C30C
  • 6.Compression Demonstration1C30C
  • 7.Compressed Archive Demonstration1C30C
  • 8.Validation1C30C

  • 9.Searching & Extracting Data and Scripting
  • 1.Input Output and Errors1C30C
  • 2.Standard Output1C30C
  • 3.Error Handling1C30C
  • 4.Input and Here Document1C30C
  • 5.Combinations1C30C
  • 6.Piping Results1C30C
  • 7.Extract Specific Data1C30C
  • 8.Introduction to Scripting1C30C
  • 9.Scripting Demonstrations1C30C
  • 10.Validation1C30C

  • 10.Choose an Operating System
  • 1.Review Operating System Fundamentals1C30C
  • 2.1C30C
  • 3.Windows vs Linux1C30C
  • 4.1C30C
  • 5.macOS1C30C

  • 11.Hardware Power Supplies Motherboard RAM
  • 1.Power Supplies1C30C
  • 2.Motherboard Overview1C30C
  • 3.Motherboard Tour1C30C
  • 4.Memory1C30C
  • 5.Validation1C30C

  • 12.Hardware CPU Storage Peripherals and Devices
  • 1.Processors (CPU)1C30C
  • 2.Hard Disk Drive Characteristics1C30C
  • 3.Hard Disk Drive Performance1C30C
  • 4.Solid State Drives (SSD)1C30C
  • 5.M.2 Storage1C30C
  • 6.RAID Arrays1C30C
  • 7.Partitions1C30C
  • 8.Drivers and Device Files1C30C
  • 9.Peripherals1C30C
  • 10.Validation1C30C

  • 13.Where Data is Stored
  • 1.Filesystem Hierarchy Standard (FHS) and Introduction1C30C
  • 2.boot and lib Directories1C30C
  • 3.var Directory1C30C
  • 4.proc Directory1C30C
  • 5.dev Directory1C30C
  • 6.sys Directory1C30C
  • 7.Binary Directories1C30C
  • 8.etc Directory1C30C
  • 9.System and Log Analysis1C30C

  • 14.Your Computer on the Network
  • 1.Introduction1C30C
  • 2.Network Layers1C30C
  • 3.Link Layer 1C30C
  • 4.Binary Numbering1C30C
  • 5.Binary and Decimal IP Addresses1C30C
  • 6.How Routing Works1C30C
  • 7.Routing and the ANDing Process1C30C
  • 8.Private IPv4 Addresses1C30C
  • 9.IPv6 Addresses1C30C
  • 10.DNS and Sockets1C30C
  • 11.1C30C

  • 15.Basic Security Tools Shell and Access Control
  • 1.Accounts and Identity Tools1C30C
  • 2.Changing the Shell1C30C
  • 3.Using su and sudo 1C30C
  • 4.Access Control Files1C30C
  • 5.Vallidation1C30C

  • 16.Creating Users and Groups
  • 1.Implement useradd to Create Users1C30C
  • 2.1C30C
  • 3.1C30C
  • 4.Modify User Account Defaults1C30C
  • 5.1C30C
  • 6.1C30C

  • 17.File Permissions Ownership and Links
  • 1.Symbolic Mode Permissions 1C30C
  • 2.Numeric Mode Permissions1C30C
  • 3.Change Ownership1C30C
  • 4.The Sticky Bit1C30C
  • 5.Set the SGID and SUID1C30C
  • 6.Hard and Symbolic Links1C30C
  • 7.Validation1C30C
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 38563
    حجم: 3838 مگابایت
    مدت زمان: 951 دقیقه
    تاریخ انتشار: ۹ مرداد ۱۴۰۳
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید