وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Complete Linux Administration Course for Career Success 2024

سرفصل های دوره

Master the Linux Administration & Linux Command Line Skills You Need to effectively Land a Job or Advance Your Career


1 - Introduction
  • 1 - Welcome

  • 2 - Section 1 Linux principles Concepts
  • 2 - What is Linux
  • 3 - Why Linux
  • 4 - Technical Terms Glossary.html

  • 3 - Section 2 Prepare Your Lab
  • 5 - Install VirtualBox on Windows
  • 6 - Create our first virtual machine
  • 7 - Add New Virtual Hard Disk
  • 8 - Why Rocky Linux and its relation to centOS and RedHat
  • 9 - Install Rocky 90 Redhat CentOS compatible
  • 10 - Port Forwarding NAT Network issue solution

  • 4 - Section 3 Understand Use Essential Linux Tools
  • 11 - Accessing the Command Line
  • 12 - Linux File System Hierarchy
  • 13 - Create Files Directories
  • 14 - Find Your Way In Linux
  • 15 - Copy Move Rename Delete Files
  • 16 - Copy Move Rename Delete Directories
  • 17 - Cat Command
  • 18 - Grep Command
  • 19 - Get Help with Manual Pages
  • 20 - Get Help with Pinfo
  • 21 - Read Linux Documentation
  • 22 - Use Input Output redirection
  • 23 - Create Edit Text Files
  • 24 - Access Remote Systems Using SSH
  • 25 - Archive Compress Unpack Uncompress Files
  • 26 - Create Hard Soft Links
  • 27 - Finding Files

  • 5 - Section 4 User Management and Permissions in Linux
  • 28 - Create Local Users Local Groups
  • 29 - Gain Super Powers
  • 30 - Modify Users Groups Password Aging
  • 31 - Configure A System To Use An Existing Authentication Service
  • 32 - Notation Permissions
  • 33 - Symbolic Permissions
  • 34 - Special Permissions

  • 6 - Section 5 Linux System Monitoring Management and Boot Procedures
  • 35 - Monitor Running Processes with ps Command
  • 36 - Run Processes in the Background
  • 37 - Terminate Running Processes with Kill Pkill
  • 38 - Monitoring Running System with top
  • 39 - Listing Unit Files with systemctl
  • 40 - Start Stop Check The status of a Linux Service
  • 41 - The Truth About System Log
  • 42 - The rsyslog
  • 43 - The SystemD Journal
  • 44 - SystemD Journal Preservation
  • 45 - Boot Reboot And Shut Down A System Normally
  • 46 - Boot Systems Into Different Targets Manually
  • 47 - Interrupt The Boot Process To Gain Access To A System
  • 48 - Adjust Process Priority With Renice

  • 7 - Section 6 Linux Filesystems Networking and System Maintenance
  • 49 - Examining the File System
  • 50 - Mounting Unmounting File System
  • 51 - Create Mount Unmount And Use Vfat ext4 And xfs File Systems
  • 52 - Mount and Unmount CIFS and NFS Network File Systems
  • 53 - Logical Volume Management LVM
  • 54 - Extend Existing Logical Volume
  • 55 - Create SWAP file and SWAP partition
  • 56 - Creating and Mounting a VDO
  • 57 - Create and manage Access Control Lists ACLs
  • 58 - Maintain Accurate Time with ntp
  • 59 - Validate Your Network Configuration
  • 60 - Configure Linux Network
  • 61 - Edit Network Configuration Files
  • 62 - Configuring Hostnames Names Resolution
  • 63 - Install Update Software with yum
  • 64 - Configure yum repository
  • 65 - Manage RPM Packages
  • 66 - Schedule Tasks Using at and cron

  • 8 - Section 7 Linux Security SSH Firewall and SElinux Essentials
  • 67 - Configure KeyBased Authentication for SSH
  • 68 - Disallow User Root from Logging In Using SSH
  • 69 - Copying Files Securely Between Systems
  • 70 - Synchronize Files Folders Securely Between Systems
  • 71 - Configure Firewall Settings Using Firewallconfig Firewallcmd
  • 72 - Introduction To SElinux
  • 73 - List And Identify SElinux File And Process Context
  • 74 - Restore Default File Contexts
  • 75 - Use Boolean Settings To Modify System SElinux
  • 76 - Diagnose And Address Routine SElinux Policy Violation

  • 9 - Section 8 Advanced Linux Networking and System Configuration
  • 77 - Configure Aggregated Network Links Between 2 RHEL Systems or Interfaces
  • 78 - Configure IPv6 Addresses and Perform Basic IPv6 Troubleshooting
  • 79 - Firewalld The rich rules
  • 80 - Configure Network Address TranslationNAT Masquerade
  • 81 - Configure Network Address Translation NAT Port forwarding
  • 82 - Configure a system as an iSCSI target
  • 83 - Configure a system as an iSCSI initiator
  • 84 - Use procsys and sysctl to Modify or Set Kernel runtime parameters
  • 85 - Produce and deliver reports on system utilizationprocessormemorydisknetwork

  • 10 - Section 9 Setting Up and Managing Core Linux Services and Applications
  • 86 - Install the packages needed to provide the service
  • 87 - Configure SELinux to support the service
  • 88 - Use SELinux port labelling to allow services to use nonstandard ports
  • 89 - Configure the service to start when the system is booted
  • 90 - Install and Configure Apache
  • 91 - Configure Apache access restrictions on directories
  • 92 - Configure Group Managed Content
  • 93 - Deploy a basic CGI application
  • 94 - Configure an Apache Virtual Host
  • 95 - Configure TLS security
  • 96 - The Apache Configuration File
  • 97 - Configure a CachingOnly Name Server
  • 98 - Provide network shares to specific clients
  • 99 - Provide network shares suitable for group collaboration
  • 100 - Use Kerberos to Control Access to NFS network shares configure Kerberos
  • 101 - Use Kerberos to Control Access to NFS network shares Configure Nfs Server
  • 102 - Provide Network Shares to Specific Clientsclient installation and configuration
  • 103 - Provide Network Shares Suitable for Group Collaboration
  • 104 - Configure a system to forward all emails to a central mail server
  • 105 - Configure KeyBased Authentication
  • 106 - Configure KeyBased Authentication 2
  • 107 - Synchronize time using other NTP peers
  • 108 - Install and Configure MariaDB
  • 109 - Create a simple database schema
  • 110 - Backup database
  • 111 - Perform simple SQL queries against a database
  • 112 - Restore a MariaDB database

  • 11 - Section 10 Virtualization On Linux
  • 113 - Install Your Virtualization Environment
  • 114 - Access Virtual Machine Console

  • 12 - Section 11 Profile Tuning for Optimal System Performance
  • 115 - Introduction to System Performance Tuning
  • 116 - Understanding and Installing the tuned Service
  • 117 - Enabling and Checking the Status of the tuned Service
  • 118 - Monitoring CPU Resource Usage
  • 119 - Adjusting Process Priorities with renice

  • 13 - Section 12 Containers
  • 120 - Introduction to Containers
  • 121 - Managing Containers on Red Hat

  • 14 - Section 13 Shell Scripting
  • 122 - Creating Your First Shell Script
  • 123 - Making a Shell Script Executable
  • 124 - Understanding Shebang
  • 125 - Using Variables
  • 126 - Command Line Arguments
  • 127 - Read User Input
  • 128 - If statements and conditions
  • 129 - Case statements
  • 130 - Using echo and printf for output
  • 131 - Using read for input
  • 132 - Using grep awk and sed for text processing
  • 133 - Functions Definition and Usage
  • 134 - Local and Global Variables in Functions
  • 135 - Arrays Definition and Usage
  • 136 - File and Directory Handling Commands
  • 137 - Understanding dev proc and sys Filesystems
  • 138 - Working with File Permissions
  • 139 - Script Debugging Techniques
  • 140 - Error Handling
  • 141 - Signals and Traps
  • 142 - The Cronjob The at Command Basics
  • 143 - The Cronjob The at Command Advanced
  • 144 - Automating System Tasks
  • 145 - Writing a Backup Script
  • 146 - Writing a System Monitoring Script
  • 147 - Writing a User Management Script
  • 148 - Shell Scripting Best Practices
  • 149 - Shell Scripting Security Considerations

  • 15 - Section 14 SSH Connectivity Transfers and Advanced Security Techniques
  • 150 - Introduction To Secure Shell
  • 151 - How do I connect to a remote host
  • 152 - How do I connect to a remote host on a different SSH port
  • 153 - How can I login to a specific directory
  • 154 - How do I execute a command on a remote host using SSH
  • 155 - How can I copy filefiles to a remote host using SCP
  • 156 - How can I copy filefiles from a remote host using SCP
  • 157 - How can I Copy entire directory using SCP
  • 158 - Can I limit the speed bandwidth of files transfer using SCP
  • 159 - What is SFTP and how to connect to SFTP
  • 160 - SFTP List file and check the working directory
  • 161 - SFTP Uploading Files
  • 162 - SFTP Downloading Files
  • 163 - SFTP Switching and Creating Directories
  • 164 - SFTP Remove Files and Directories
  • 165 - Multiple SSH Sessions with screen Install Screen
  • 166 - Multiple SSH Sessions with screen Start working
  • 167 - Multiple SSH Sessions with screen Lock and Exit from the screen
  • 168 - Tunneling x11 Through SSH Linux
  • 169 - Tunneling x11 Through SSH Run Linux Applications on Windows
  • 170 - Remote Desktop with SSH Install and Configure VNC Server
  • 171 - Remote Desktop with SSH Connect to Remote Desktop
  • 172 - Change The Default Port
  • 173 - Disable Direct Root Access
  • 174 - Allow Access for Certain Users
  • 175 - Deny Access from Known IPs
  • 176 - Allow Access from Known IPs
  • 177 - Public Key Authentication
  • 178 - Disable Password Authentication

  • 16 - Section 15 Apache Web Server Deep Dive Setup Configuration and Security
  • 179 - Introduction to web server
  • 180 - Essentials
  • 181 - Install Apache using yum
  • 182 - Enable Apache to automatically start when system boot
  • 183 - Configure the firewall service
  • 184 - Where is Apache
  • 185 - Apache directory structure
  • 186 - Configuration file
  • 187 - Create your first page
  • 188 - Setting up the virtual host name based
  • 189 - Setting up the virtual host port based
  • 190 - Configuring an alias for a url
  • 191 - Redirects
  • 192 - The error log
  • 193 - The access log
  • 194 - Custom log
  • 195 - Log rotation
  • 196 - Basic Security Part 1
  • 197 - Basic Security Part 2
  • 198 - Set up TLSSSl for free
  • 199 - Basic authentication
  • 200 - Digest authentication
  • 201 - Access Control
  • 202 - htaccess Administrator Side
  • 203 - htaccess User Side
  • 204 - Authentication notes.html
  • 205 - Install and Configure antivirus
  • 206 - Mitigate dos attacks modevasive
  • 207 - Apache MultiProcessing Modules MPMs.html
  • 208 - Adjusting httpdconf Part 1
  • 209 - Adjusting httpdconf Part 2
  • 210 - Troubleshoot Apache Analyze Access Log Part 1
  • 211 - Troubleshoot Apache Analyze Access Log Part 2
  • 212 - Use Apachetop to monitor web server traffic

  • 17 - Section 16 Linux Tasks Using ChatGPT Boosting Productivity
  • 213 - ChatGPT Fundamentals.html
  • 214 - How to delete files that are older than x amount of days in Linux
  • 215 - Give me a cronjob that runs on the 3rd day of each month at 145 am
  • 216 - Create a self signed certificate by using OpenSSL
  • 217 - Install nginx latest version and laravel 7 then configure nginx as reverse proxy
  • 218 - Configure SSL for Laravel
  • 219 - Steps on how to install MariaDB create database and username for Laravel
  • 220 - Configure firewalld
  • 221 - Restrict SSH login to a specific IP or host
  • 222 - Configure network to assign a static IP on Ubuntu 220
  • 223 - Troubleshoot no route to host error when connecting to remote host using ssh
  • 224 - Im getting connection timeout in nginx with requests take more than 2 minutes
  • 225 - Troubleshoot SSH HOST IDENTIFICATION HAS CHANGED error
  • 226 - Troubleshoot MariaDB too many connections error
  • 227 - Shell command to get the top IPs that are connected to nginx
  • 228 - Shell script to check top processes that consume CPU and send me notification
  • 229 - Shell script to monitor hard disk partitions free space and send notification
  • 230 - Shell script to monitor nginx access log every 6 hours to get 5xx errors

  • 18 - Section 17 Additional Linux Administration Lectures
  • 231 - Vi editor part 1
  • 232 - Vi editor part 2
  • 233 - Software RAID
  • 234 - Process Managment
  • 235 - VMSTAT And IOSTAT
  • 236 - List Open Files LSOF
  • 237 - Tcpdump
  • 238 - Search for Files on Linux using find and locate
  • 239 - AWK Command
  • 240 - HEAD Command
  • 241 - Network Clients ssh Scp Ftp wget

  • 19 - Section 18 RHCSA Exam Preparations
  • 242 - RHCSA Exam Details
  • 243 - Study Smart Key Areas for RHCSA Exam Success.html
  • 244 - RHCSA Exam Preparation Guide.html
  • 245 - RHCSA Mock Exam.html

  • 20 - Section 19 Cover Letter CV Structure
  • 246 - How to write a cover letter
  • 247 - CV Structure
  • 45,900 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 30351
    حجم: 7965 مگابایت
    مدت زمان: 1729 دقیقه
    تاریخ انتشار: 2 اسفند 1402
    طراحی سایت و خدمات سئو

    45,900 تومان
    افزودن به سبد خرید