Level: Foundation

CompTIA Linux+

5 Day | Instructor Led

CompTIA Linux+ Powered by LPI is a vendor-neutral certification, generic across distributions, targeted to individuals with a minimum of six to 12 months of practical Linux experience. The CompTIA Linux+ Powered by LPI exam covers fundamental management of Linux systems from the command line, user administration, file permissions, software configuration and management of Linux-based clients.

Inquire About
CompTIA Linux+

Ideal Candidates for CompTIA Linux+ Class

This course can benefit you in two ways. If your job duties include Linux troubleshooting, installation, or maintenance, or if you are preparing for any type of Linux-related career, it provides the background knowledge and skills you will require to be successful. In addition, it assists you if you are preparing to take the CompTIA® Linux+™ Powered by LPI exams (Exam Codes: LX0-103 and LX0-104), in order to become a CompTIA® Linux+™ Certified Professional.

CompTIA Linux+ Prerequisites

CompTIA Linux+ Powered by LPI is designed for students who have minimum of one year of experience in the Linux computer industry, those that have extensive experience with at least one other operating system.

What You'll Get in CompTIA Linux+

Expert Level Instruction

Official CompTIA Linux + Curriculum

Award Winning Ultimate Knowledge Student Workbook

Course Related Readings (Reinforcement)

Daily Exercises to Reinforce Memory Recall - Cognitive Core

What You'll Learn in CompTIA Linux+

Investigate information about Linux that can help you prepare for supporting Linux users and machines.

Work with user and group accounts.

Work with the Linux filesystem.

Manipulate various types of Linux files.

Change ownership and permissions for Linux files and directories.

Work with Linux printing services.

Work with Linux packages.

Work with many of the configuration files and commands that make up the Linux environment.

Work with jobs and processes.

Compare the services critical to running the Linux operating system to those services that can be run to enhance or expand system performance.

Configure Linux services related to Internet use.

Configure Linux services for providing users with network connectivity.

Investigate basic security issues in Linux.

Work with the hardware commonly associated with Linux machines.

Install the Linux operating system.

CompTIA Linux+ Certification

This course is intended for entry-level computer support professionals with basic knowledge of computer hardware, software, and operating systems, who wish to increase their knowledge and understanding of Linux concepts and skills to prepare for a career in Linux support or administration, or to prepare for the CompTIA Linux+ Powered by LPI certification (exam numbers LX0-103 & LX0-104).

CompTIA Linux+ Outline

Course Content

Lesson 1: Performing Basic Linux Tasks
Topic A: Identify the History and Development of Linux
Topic B: Enter Shell Commands
Topic C: Get Help Using Linux
Topic D: Start and Stop Linux

Lesson 2: Managing User and Group Accounts
Topic A: Create User and Group Accounts
Topic B: Configure User Profiles
Topic C: Administer User and Group Accounts

Lesson 3: Managing Partitions and the Linux Filesystem
Topic A: Create Partitions
Topic B: Navigate Through the Linux Filesystem
Topic C: Manage the Filesystem
Topic D: Maintain the Filesystem

Lesson 4: Managing Files in Linux
Topic A: Create and Edit Text Files
Topic B: Locate Files
Topic C: Search Text Using Regular Expressions
Topic D: Apply Filters to Text Streams
Topic E: Link Files
Topic F: Back Up and Restore Files
Topic G: Manage Databases Using MariaDB

Lesson 5: Managing Linux Permissions and Ownership
Topic A: Modify File and Directory Permissions
Topic B: Modify Default Permissions
Topic C: Modify File and Directory Ownership
Topic D: Set Special Permissions and Attributes

Lesson 6: Printing Files
Topic A: Configure a Local Printer
Topic B: Print Files
Topic C: Configure Remote Printing

Lesson 7: Managing Packages
Topic A: Manage Packages Using RPM
Topic B: Verify Packages
Topic C: Upgrade Packages
Topic D: Configure Repositories
Topic E: Manage Packages Using YUM
Topic F: Advanced Package and Application Management

Lesson 8: Managing Kernel Services
Topic A: Explore the Linux Kernel
Topic B: Customize Kernel Modules
Topic C: Create an initrd Image
Topic D: Manage Device Drivers and Hardware Devices
Topic E: Monitor Processes and Resources

Lesson 9: Working with the Bash Shell and Shell Scripts
Topic A: Perform Basic Bash Shell Operations
Topic B: Write a Bash Shell Script
Topic C: Customize the Bash Shell
Topic D: Redirect Standard Input and Output
Topic E: Use Control Statements in Shell Scripts

Lesson 10: Managing Jobs and Processes
Topic A: Manage Jobs and Background Processes
Topic B: Manage Processes Using the Process Table
Topic C: Delay and Detach Jobs
Topic D: Schedule Jobs
Topic E: Maintain the System Time

Lesson 11: Managing System Services
Topic A: Configure System Services
Topic B: Monitor System Logs
Topic C: Configure Security-Enhanced Linux (SELinux)

Lesson 12: Configuring Network Services
Topic A: Connect to a Network
Topic B: Configure Routes
Topic C: Configure Client Network Services
Topic D: Manage Remote Network Systems

Lesson 13: Configuring Basic Internet Services
Topic A: Configure Email Services
Topic B: Control Internet Services

Lesson 14: Securing Linux
Topic A: Implement Basic System Security
Topic B: Secure User Accounts

Lesson 15: Managing Hardware
Topic A: Identify Common Hardware Components and Resources
Topic B: Configure Removable Hardware
Topic C: Configure Disk Quotas

Lesson 16: Troubleshooting Linux Systems
Topic A: Troubleshoot System-Based Issues
Topic B: Troubleshoot Hardware Issues
Topic C: Troubleshoot Network Connection and Security Issues

Lesson 17: Installing Linux
Topic A: Prepare for Installation
Topic B: The Linux Boot Process
Topic C: Configure GRUB
Topic D: Install the Operating System

Lesson 18: Configuring the GUI
Topic A: Implement X
Topic B: Customize the Display Manager
Topic C: Enable Accessibility Settings in Linux

Testimonials

A. Erlich

RITSC, N6C

I just wanted to say your presentation on Social Media Technology and Security was the finest I have ever attended.

Wilder Guerra

US Navy Reserve

This course is definitely an eye opener. With how much social media has taken over, it is important to be fully aware of the capabilities along with all the risks it brings. It is important to get this course because social media is the new norm.

Rebekah Coughlin

MicroTech

The Social Media and Security Training course offered by UKI is a great and beneficial course combining technical training to fully understand TCP IP networking, DNS, and the harms of malware and cross-site scripting; as well as practical training that allowed attendees to play with open source social intelligence gathering solutions. This is the perfect class for those involved in IT security and interested in social media and identity theft.


Top Related Courses

Business Email Compromise (BEC) XML Entity Injection (XXE) Exercise

The BEC XXE exercise is a customized, six-hour, Cyber Range exercise hosted on ManTech’s Advanced Cyber Range Environment (ACRE). Lead by expert cyber security engineers, the exercise can be executed in a classroom and remotely. In this exercise, BEC-based attacks are simulated. Participants will be introduced to variations of the BEC attack (both external and internal) and will capture, preserve and recover network and host-based artifacts from the attacks. They will also determine the origin of the attacks, the extent of the compromise, and any on-going activity related to it. Discussion focuses on blue team threat hunter tasks. This exercise uses a hands-on keyboard approach to create realistic technical training and management interaction opportunities where participants respond to and report events as identified. Participants are engaged via an Incident Response "Observe/Engage" Model and are encouraged to view the attack as if it were happening to their institutions in real time. Participants are asked to share what they have done or would do based on the facts provided.


Cyber Vanguard Series- Cyber Storm Assault Tactics

All actions in war, regardless of the level, are based upon either taking the initiative or reacting in response to the opponent. By taking the initiative, we dictate the terms of the conflict and force the enemy to meet us on our terms. The initiative allows us to pursue some positive aim even if only to preempt an enemy initiative. It is through the initiative that we seek to impose our will on the enemy.


Cyber Vanguard Series-Cyber Strike

Cyber Vanguard Series - Cyber Strike takes the offensive and defensive assault tactics and applies them in several different real world scenarios. The entire course is hands on and builds upon the skills and knowledge the students have previously received. Applications include Offensive only - Hunt Teaming, Data Harvesting, and Asset Extraction, Defensive Only – Defending Your Assets, Setting Active Intrusion Systems, Vulnerability Assessment and Remediation, and Offensive and Defensive – Capture the Flag, where teams are pitted against each other to protect their own resources while attacking the opposing team.


© 2019 Ultimate Knowledge Insitute | All Rights Reserved | GSA# GS-35F-0469W