- Tel: +44 (0)1275 859666
CA02 - CompTIA Linux+ Certification - 5 Days
Course Description
Customisation
For on-site courses (i.e. at your premises), we are more than happy to tailor the course agenda to suit your exact requirements. In many cases, we are able to build your in-house standards and naming conventions into the delivered course.
Course Details
Hardware and System Configuration
- Explain Linux boot process concepts
- Boot loaders
- Boot options
- File locations
- Boot modules and files
- Kernel panic
- Boot loaders
- Given a scenario, install, configure, and monitor kernel modules
- Commands
- Locations
- Locations
- Given a scenario, configure and verify network connection parameters
- Diagnostic tools
- Configuration files
- Bonding
- Configuration files
- Given a scenario, manage storage in a Linux environment
- Basic partitions
- File system hierarchy
- Device mapper
- Tools
- Location
- File system types
- File system hierarchy
- Compare and contrast cloud and virtualization concepts and technologies
- Templates
- Bootstrapping
- Storage
- Network considerations
- Types of hypervisors
- Tools
- Bootstrapping
- Given a scenario, configure localization options
- File locations
- Commands
- Environment variables
- Character sets
- Commands
Systems Operation and Maintenance
- Given a scenario, conduct software installations, configurations, updates, and removals
- Package types
- Installation tools
- Build tools
- Repositories
- Acquisition commands
- Package types
- Given a scenario, manage users and groups
- Creation
- Modification
- Deletion
- Queries
- Quotas
- Profiles
- Important files and file contents
- Modification
- Given a scenario, create, modify, and redirect files
- Text editors
- File readers
- Output redirection
- Text processing
- File and directory operations
- File readers
- Given a scenario, manage services
- Systemd management
- SysVinit
- SysVinit
- Summarize and explain server roles
- NTP
- SSH
- Web
- Certificate authority
- Name server
- DHCP
- File servers
- Authentication server
- Proxy
- Logging
- Containers
- VPN
- Monitoring
- Database
- Print server
- Mail server
- Load balancer
- Clustering
- SSH
- Given a scenario, automate and schedule jobs
- cron
- at
- crontab
- fg
- bg
- &
- kill
- Ctrl+c
- Ctrl+z
- nohup
- at
- Explain the use and operation of Linux devices
- Types of devices
- Monitoring and configuration tools
- File locations
- Hot pluggable devices
- Monitoring and configuration tools
- Compare and contrast Linux graphical user interfaces
- Servers
- GUI
- Remote desktop
- Console redirection
- Accessibility
- GUI
Security
- Given a scenario, apply or acquire the appropriate user and/or group permissions and ownership
- File and directory permissions
- Context-based permissions
- Privilege escalation
- User types
- File and directory permissions
- Given a scenario, configure and implement appropriate access and authentication methods
- PAM
- SSH
- TTYs
- PTYs
- PKI
- VPN as a client
- SSH
- Summarize security best practices in a Linux environment
- Boot security
- Additional authentication methods
- Importance of disabling root login via SSH
- Password-less login
- Chroot jail services
- No shared IDs
- Importance of denying hosts
- Separation of OS data from application data
- Change default ports
- Importance of disabling or uninstalling unused and unsecure services
- Importance of enabling SSL/TLS
- Importance of enabling auditd
- CVE monitoring
- Discouraging use of USB devices
- Disk encryption
- Restrict cron access
- Disable Ctrl+Alt+Del
- Add banner
- MOTD
- Additional authentication methods
- Given a scenario, implement logging services
- Key file locations
- Log management
- lastb
- Log management
- Given a scenario, implement and configure Linux firewalls
- Access control lists
- Technologies
- IP forwarding
- Dynamic rule sets
- Common application firewall configurations
- Technologies
- Given a scenario, backup, restore, and compress files
- Archive and restore utilities
- Compression
- Backup types
- Off-site/off-system storage
- Integrity checks
- Compression
Linux Troubleshooting and Diagnostics
- Given a scenario, analyze system properties and remediate accordingly
- Network monitoring and configuration
- Storage monitoring and configuration
- CPU monitoring and configuration
- Memory monitoring and configuration
- Lost root password
- Network monitoring and configuration
- Given a scenario, analyze system processes in order to optimize performance
- Process management
- Given a scenario, analyze and troubleshoot user issues
- Permissions
- Access
- Authentication
- File creation
- Insufficient privileges for authorization
- Environment and shell issues
- Access
- Given a scenario, analyze and troubleshoot application and hardware issues
- SELinux context violations
- Storage
- Firewall
- Permission
- Dependencies
- Troubleshooting additional hardware issues
- Storage
Automation and Scripting
- Given a scenario, deploy and execute basic BASH scripts
- Shell environments and shell variables
- #!/bin/bash
- Sourcing scripts
- Directory and file permissions
- Extensions
- Commenting
- File globbing
- Shell expansions
- Redirection and piping
- Exit codes
- Metacharacters
- Positional parameters
- Looping constructs
- Conditional statements
- Escaping characters
- Shell environments and shell variables
- Given a scenario, carry out version control using Git
- Arguments
- Files
- Files
- Summarize orchestration processes and concepts
- Agent
- Agentless
- Procedures
- Attributes
- Infrastructure automation
- Infrastructure as code
- Inventory
- Automated configuration management
- Build automation
- Agentless