وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Complete Linux Administration Course for Career Success 2024

سرفصل های دوره

Master the Linux Administration & Linux Command Line Skills You Need to effectively Land a Job or Advance Your Career


1 - Introduction
  • 1 - Welcome

  • 2 - Section 1 Linux principles Concepts
  • 2 - What is Linux
  • 3 - Why Linux
  • 4 - Technical Terms Glossary.html

  • 3 - Section 2 Prepare Your Lab
  • 5 - Install VirtualBox on Windows
  • 6 - Create our first virtual machine
  • 7 - Add New Virtual Hard Disk
  • 8 - Why Rocky Linux and its relation to centOS and RedHat
  • 9 - Install Rocky 90 Redhat CentOS compatible
  • 10 - Port Forwarding NAT Network issue solution

  • 4 - Section 3 Understand Use Essential Linux Tools
  • 11 - Accessing the Command Line
  • 12 - Linux File System Hierarchy
  • 13 - Create Files Directories
  • 14 - Find Your Way In Linux
  • 15 - Copy Move Rename Delete Files
  • 16 - Copy Move Rename Delete Directories
  • 17 - Cat Command
  • 18 - Grep Command
  • 19 - Get Help with Manual Pages
  • 20 - Get Help with Pinfo
  • 21 - Read Linux Documentation
  • 22 - Use Input Output redirection
  • 23 - Create Edit Text Files
  • 24 - Access Remote Systems Using SSH
  • 25 - Archive Compress Unpack Uncompress Files
  • 26 - Create Hard Soft Links
  • 27 - Finding Files

  • 5 - Section 4 User Management and Permissions in Linux
  • 28 - Create Local Users Local Groups
  • 29 - Gain Super Powers
  • 30 - Modify Users Groups Password Aging
  • 31 - Configure A System To Use An Existing Authentication Service
  • 32 - Notation Permissions
  • 33 - Symbolic Permissions
  • 34 - Special Permissions

  • 6 - Section 5 Linux System Monitoring Management and Boot Procedures
  • 35 - Monitor Running Processes with ps Command
  • 36 - Run Processes in the Background
  • 37 - Terminate Running Processes with Kill Pkill
  • 38 - Monitoring Running System with top
  • 39 - Listing Unit Files with systemctl
  • 40 - Start Stop Check The status of a Linux Service
  • 41 - The Truth About System Log
  • 42 - The rsyslog
  • 43 - The SystemD Journal
  • 44 - SystemD Journal Preservation
  • 45 - Boot Reboot And Shut Down A System Normally
  • 46 - Boot Systems Into Different Targets Manually
  • 47 - Interrupt The Boot Process To Gain Access To A System
  • 48 - Adjust Process Priority With Renice

  • 7 - Section 6 Linux Filesystems Networking and System Maintenance
  • 49 - Examining the File System
  • 50 - Mounting Unmounting File System
  • 51 - Create Mount Unmount And Use Vfat ext4 And xfs File Systems
  • 52 - Mount and Unmount CIFS and NFS Network File Systems
  • 53 - Logical Volume Management LVM
  • 54 - Extend Existing Logical Volume
  • 55 - Create SWAP file and SWAP partition
  • 56 - Creating and Mounting a VDO
  • 57 - Create and manage Access Control Lists ACLs
  • 58 - Maintain Accurate Time with ntp
  • 59 - Validate Your Network Configuration
  • 60 - Configure Linux Network
  • 61 - Edit Network Configuration Files
  • 62 - Configuring Hostnames Names Resolution
  • 63 - Install Update Software with yum
  • 64 - Configure yum repository
  • 65 - Manage RPM Packages
  • 66 - Schedule Tasks Using at and cron

  • 8 - Section 7 Linux Security SSH Firewall and SElinux Essentials
  • 67 - Configure KeyBased Authentication for SSH
  • 68 - Disallow User Root from Logging In Using SSH
  • 69 - Copying Files Securely Between Systems
  • 70 - Synchronize Files Folders Securely Between Systems
  • 71 - Configure Firewall Settings Using Firewallconfig Firewallcmd
  • 72 - Introduction To SElinux
  • 73 - List And Identify SElinux File And Process Context
  • 74 - Restore Default File Contexts
  • 75 - Use Boolean Settings To Modify System SElinux
  • 76 - Diagnose And Address Routine SElinux Policy Violation

  • 9 - Section 8 Advanced Linux Networking and System Configuration
  • 77 - Configure Aggregated Network Links Between 2 RHEL Systems or Interfaces
  • 78 - Configure IPv6 Addresses and Perform Basic IPv6 Troubleshooting
  • 79 - Firewalld The rich rules
  • 80 - Configure Network Address TranslationNAT Masquerade
  • 81 - Configure Network Address Translation NAT Port forwarding
  • 82 - Configure a system as an iSCSI target
  • 83 - Configure a system as an iSCSI initiator
  • 84 - Use procsys and sysctl to Modify or Set Kernel runtime parameters
  • 85 - Produce and deliver reports on system utilizationprocessormemorydisknetwork

  • 10 - Section 9 Setting Up and Managing Core Linux Services and Applications
  • 86 - Install the packages needed to provide the service
  • 87 - Configure SELinux to support the service
  • 88 - Use SELinux port labelling to allow services to use nonstandard ports
  • 89 - Configure the service to start when the system is booted
  • 90 - Install and Configure Apache
  • 91 - Configure Apache access restrictions on directories
  • 92 - Configure Group Managed Content
  • 93 - Deploy a basic CGI application
  • 94 - Configure an Apache Virtual Host
  • 95 - Configure TLS security
  • 96 - The Apache Configuration File
  • 97 - Configure a CachingOnly Name Server
  • 98 - Provide network shares to specific clients
  • 99 - Provide network shares suitable for group collaboration
  • 100 - Use Kerberos to Control Access to NFS network shares configure Kerberos
  • 101 - Use Kerberos to Control Access to NFS network shares Configure Nfs Server
  • 102 - Provide Network Shares to Specific Clientsclient installation and configuration
  • 103 - Provide Network Shares Suitable for Group Collaboration
  • 104 - Configure a system to forward all emails to a central mail server
  • 105 - Configure KeyBased Authentication
  • 106 - Configure KeyBased Authentication 2
  • 107 - Synchronize time using other NTP peers
  • 108 - Install and Configure MariaDB
  • 109 - Create a simple database schema
  • 110 - Backup database
  • 111 - Perform simple SQL queries against a database
  • 112 - Restore a MariaDB database

  • 11 - Section 10 Virtualization On Linux
  • 113 - Install Your Virtualization Environment
  • 114 - Access Virtual Machine Console

  • 12 - Section 11 Profile Tuning for Optimal System Performance
  • 115 - Introduction to System Performance Tuning
  • 116 - Understanding and Installing the tuned Service
  • 117 - Enabling and Checking the Status of the tuned Service
  • 118 - Monitoring CPU Resource Usage
  • 119 - Adjusting Process Priorities with renice

  • 13 - Section 12 Containers
  • 120 - Introduction to Containers
  • 121 - Managing Containers on Red Hat

  • 14 - Section 13 Shell Scripting
  • 122 - Creating Your First Shell Script
  • 123 - Making a Shell Script Executable
  • 124 - Understanding Shebang
  • 125 - Using Variables
  • 126 - Command Line Arguments
  • 127 - Read User Input
  • 128 - If statements and conditions
  • 129 - Case statements
  • 130 - Using echo and printf for output
  • 131 - Using read for input
  • 132 - Using grep awk and sed for text processing
  • 133 - Functions Definition and Usage
  • 134 - Local and Global Variables in Functions
  • 135 - Arrays Definition and Usage
  • 136 - File and Directory Handling Commands
  • 137 - Understanding dev proc and sys Filesystems
  • 138 - Working with File Permissions
  • 139 - Script Debugging Techniques
  • 140 - Error Handling
  • 141 - Signals and Traps
  • 142 - The Cronjob The at Command Basics
  • 143 - The Cronjob The at Command Advanced
  • 144 - Automating System Tasks
  • 145 - Writing a Backup Script
  • 146 - Writing a System Monitoring Script
  • 147 - Writing a User Management Script
  • 148 - Shell Scripting Best Practices
  • 149 - Shell Scripting Security Considerations

  • 15 - Section 14 SSH Connectivity Transfers and Advanced Security Techniques
  • 150 - Introduction To Secure Shell
  • 151 - How do I connect to a remote host
  • 152 - How do I connect to a remote host on a different SSH port
  • 153 - How can I login to a specific directory
  • 154 - How do I execute a command on a remote host using SSH
  • 155 - How can I copy filefiles to a remote host using SCP
  • 156 - How can I copy filefiles from a remote host using SCP
  • 157 - How can I Copy entire directory using SCP
  • 158 - Can I limit the speed bandwidth of files transfer using SCP
  • 159 - What is SFTP and how to connect to SFTP
  • 160 - SFTP List file and check the working directory
  • 161 - SFTP Uploading Files
  • 162 - SFTP Downloading Files
  • 163 - SFTP Switching and Creating Directories
  • 164 - SFTP Remove Files and Directories
  • 165 - Multiple SSH Sessions with screen Install Screen
  • 166 - Multiple SSH Sessions with screen Start working
  • 167 - Multiple SSH Sessions with screen Lock and Exit from the screen
  • 168 - Tunneling x11 Through SSH Linux
  • 169 - Tunneling x11 Through SSH Run Linux Applications on Windows
  • 170 - Remote Desktop with SSH Install and Configure VNC Server
  • 171 - Remote Desktop with SSH Connect to Remote Desktop
  • 172 - Change The Default Port
  • 173 - Disable Direct Root Access
  • 174 - Allow Access for Certain Users
  • 175 - Deny Access from Known IPs
  • 176 - Allow Access from Known IPs
  • 177 - Public Key Authentication
  • 178 - Disable Password Authentication

  • 16 - Section 15 Apache Web Server Deep Dive Setup Configuration and Security
  • 179 - Introduction to web server
  • 180 - Essentials
  • 181 - Install Apache using yum
  • 182 - Enable Apache to automatically start when system boot
  • 183 - Configure the firewall service
  • 184 - Where is Apache
  • 185 - Apache directory structure
  • 186 - Configuration file
  • 187 - Create your first page
  • 188 - Setting up the virtual host name based
  • 189 - Setting up the virtual host port based
  • 190 - Configuring an alias for a url
  • 191 - Redirects
  • 192 - The error log
  • 193 - The access log
  • 194 - Custom log
  • 195 - Log rotation
  • 196 - Basic Security Part 1
  • 197 - Basic Security Part 2
  • 198 - Set up TLSSSl for free
  • 199 - Basic authentication
  • 200 - Digest authentication
  • 201 - Access Control
  • 202 - htaccess Administrator Side
  • 203 - htaccess User Side
  • 204 - Authentication notes.html
  • 205 - Install and Configure antivirus
  • 206 - Mitigate dos attacks modevasive
  • 207 - Apache MultiProcessing Modules MPMs.html
  • 208 - Adjusting httpdconf Part 1
  • 209 - Adjusting httpdconf Part 2
  • 210 - Troubleshoot Apache Analyze Access Log Part 1
  • 211 - Troubleshoot Apache Analyze Access Log Part 2
  • 212 - Use Apachetop to monitor web server traffic

  • 17 - Section 16 Linux Tasks Using ChatGPT Boosting Productivity
  • 213 - ChatGPT Fundamentals.html
  • 214 - How to delete files that are older than x amount of days in Linux
  • 215 - Give me a cronjob that runs on the 3rd day of each month at 145 am
  • 216 - Create a self signed certificate by using OpenSSL
  • 217 - Install nginx latest version and laravel 7 then configure nginx as reverse proxy
  • 218 - Configure SSL for Laravel
  • 219 - Steps on how to install MariaDB create database and username for Laravel
  • 220 - Configure firewalld
  • 221 - Restrict SSH login to a specific IP or host
  • 222 - Configure network to assign a static IP on Ubuntu 220
  • 223 - Troubleshoot no route to host error when connecting to remote host using ssh
  • 224 - Im getting connection timeout in nginx with requests take more than 2 minutes
  • 225 - Troubleshoot SSH HOST IDENTIFICATION HAS CHANGED error
  • 226 - Troubleshoot MariaDB too many connections error
  • 227 - Shell command to get the top IPs that are connected to nginx
  • 228 - Shell script to check top processes that consume CPU and send me notification
  • 229 - Shell script to monitor hard disk partitions free space and send notification
  • 230 - Shell script to monitor nginx access log every 6 hours to get 5xx errors

  • 18 - Section 17 Additional Linux Administration Lectures
  • 231 - Vi editor part 1
  • 232 - Vi editor part 2
  • 233 - Software RAID
  • 234 - Process Managment
  • 235 - VMSTAT And IOSTAT
  • 236 - List Open Files LSOF
  • 237 - Tcpdump
  • 238 - Search for Files on Linux using find and locate
  • 239 - AWK Command
  • 240 - HEAD Command
  • 241 - Network Clients ssh Scp Ftp wget

  • 19 - Section 18 RHCSA Exam Preparations
  • 242 - RHCSA Exam Details
  • 243 - Study Smart Key Areas for RHCSA Exam Success.html
  • 244 - RHCSA Exam Preparation Guide.html
  • 245 - RHCSA Mock Exam.html

  • 20 - Section 19 Cover Letter CV Structure
  • 246 - How to write a cover letter
  • 247 - CV Structure
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 30351
    حجم: 7965 مگابایت
    مدت زمان: 1729 دقیقه
    تاریخ انتشار: ۲ اسفند ۱۴۰۲
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید