وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

LPI Linux Essentials Online Training

سرفصل های دوره

1.Linux Evolution and Popular Operating Systems
  • 1.Intro1C30C
  • 2.The Function of an Operating System1C30C
  • 3.The History of Linux1C30C
  • 4.Comparing Windows and Linux1C30C
  • 5.Why Use Linux 1C30C
  • 6.Linux Distributions1C30C
  • 7.Alternative Linux Distributions1C30C
  • 8.Validation1C30C

  • 2.Linux Software Packages
  • 1.Introduction1C30C
  • 2.Open Source Apps Programming Server and Administration1C30C
  • 3.1C30C
  • 4.Major Open Source Apps Desktop and Mobile1C30C
  • 5.Install Software via GUI apt and dnf1C30C
  • 6.Uninstall Software1C30C
  • 7.Open Source Software and Licensing1C30C

  • 3.Getting to the Command Line and Desktop Skills
  • 1.Linux Interface - Command Line1C30C
  • 2.Linux Desktop Environment - Overview1C30C
  • 3.Linux Desktop Environment - GNOME and KDE Plasma1C30C
  • 4.Linux Desktop Environment - Linux Mint Cinnamon1C30C
  • 5.1C30C
  • 6.Validation1C30C

  • 4.ITC Skills and Working in Linux
  • 1.Linux in Daily Life and Industry1C30C
  • 2.Linux in the Server Room and on the Desktop1C30C
  • 3.IaaS PaaS and SaaS1C30C
  • 4.Virtualize Servers1C30C
  • 5.Virtualize Desktops1C30C
  • 6.Install Virtualization Software and Guests1C30C
  • 7.Validation1C30C

  • 5.Linux Privacy and Security
  • 1.Introduction1C30C
  • 2.Internet Cookies and Privacy1C30C
  • 3.Choose Strong Passwords1C30C
  • 4.Encryption What Do We Need to Protect 1C30C
  • 5.Using Certificates to Encrypt and Sign1C30C
  • 6.Encryption Cant Help you Here1C30C
  • 7.Encryption Tools and Demo1C30C
  • 8.Validation1C30C

  • 6.Finding Your Way on a Linux System
  • 1.Command Line Basics Overview1C30C
  • 2.1C30C
  • 3.Command Line Basics Demo1C30C
  • 4.1C30C
  • 5.Local and Environment Variables1C30C
  • 6.Getting Help From the Command Line1C30C

  • 7.Managing Directories and Files
  • 1.Using Directories Overview1C30C
  • 2.Using Directories Demo1C30C
  • 3.Advanced ls Options1C30C
  • 4.Creating Managing and Deleting Files1C30C
  • 5.Validation1C30C

  • 8.Archiving Files on the Command Line
  • 1.Archiving1C30C
  • 2.Compression1C30C
  • 3.Archive and Compression Tools1C30C
  • 4.Archive and Compression Commands1C30C
  • 5.Archive Demonstration1C30C
  • 6.Compression Demonstration1C30C
  • 7.Compressed Archive Demonstration1C30C
  • 8.Validation1C30C

  • 9.Searching & Extracting Data and Scripting
  • 1.Input Output and Errors1C30C
  • 2.Standard Output1C30C
  • 3.Error Handling1C30C
  • 4.Input and Here Document1C30C
  • 5.Combinations1C30C
  • 6.Piping Results1C30C
  • 7.Extract Specific Data1C30C
  • 8.Introduction to Scripting1C30C
  • 9.Scripting Demonstrations1C30C
  • 10.Validation1C30C

  • 10.Choose an Operating System
  • 1.Review Operating System Fundamentals1C30C
  • 2.1C30C
  • 3.Windows vs Linux1C30C
  • 4.1C30C
  • 5.macOS1C30C

  • 11.Hardware Power Supplies Motherboard RAM
  • 1.Power Supplies1C30C
  • 2.Motherboard Overview1C30C
  • 3.Motherboard Tour1C30C
  • 4.Memory1C30C
  • 5.Validation1C30C

  • 12.Hardware CPU Storage Peripherals and Devices
  • 1.Processors (CPU)1C30C
  • 2.Hard Disk Drive Characteristics1C30C
  • 3.Hard Disk Drive Performance1C30C
  • 4.Solid State Drives (SSD)1C30C
  • 5.M.2 Storage1C30C
  • 6.RAID Arrays1C30C
  • 7.Partitions1C30C
  • 8.Drivers and Device Files1C30C
  • 9.Peripherals1C30C
  • 10.Validation1C30C

  • 13.Where Data is Stored
  • 1.Filesystem Hierarchy Standard (FHS) and Introduction1C30C
  • 2.boot and lib Directories1C30C
  • 3.var Directory1C30C
  • 4.proc Directory1C30C
  • 5.dev Directory1C30C
  • 6.sys Directory1C30C
  • 7.Binary Directories1C30C
  • 8.etc Directory1C30C
  • 9.System and Log Analysis1C30C

  • 14.Your Computer on the Network
  • 1.Introduction1C30C
  • 2.Network Layers1C30C
  • 3.Link Layer 1C30C
  • 4.Binary Numbering1C30C
  • 5.Binary and Decimal IP Addresses1C30C
  • 6.How Routing Works1C30C
  • 7.Routing and the ANDing Process1C30C
  • 8.Private IPv4 Addresses1C30C
  • 9.IPv6 Addresses1C30C
  • 10.DNS and Sockets1C30C
  • 11.1C30C

  • 15.Basic Security Tools Shell and Access Control
  • 1.Accounts and Identity Tools1C30C
  • 2.Changing the Shell1C30C
  • 3.Using su and sudo 1C30C
  • 4.Access Control Files1C30C
  • 5.Vallidation1C30C

  • 16.Creating Users and Groups
  • 1.Implement useradd to Create Users1C30C
  • 2.1C30C
  • 3.1C30C
  • 4.Modify User Account Defaults1C30C
  • 5.1C30C
  • 6.1C30C

  • 17.File Permissions Ownership and Links
  • 1.Symbolic Mode Permissions 1C30C
  • 2.Numeric Mode Permissions1C30C
  • 3.Change Ownership1C30C
  • 4.The Sticky Bit1C30C
  • 5.Set the SGID and SUID1C30C
  • 6.Hard and Symbolic Links1C30C
  • 7.Validation1C30C
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 38563
    حجم: 3838 مگابایت
    مدت زمان: 951 دقیقه
    تاریخ انتشار: 9 مرداد 1403
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید