Companies Home Search Profile

Become a Linux Pro: A Comprehensive Guide

Focused View

Alexander Commodore

3:26:37

103 View
  • 1.1 Linux Course_ VM_UB 1.1.docx
  • 1. Lab SetUp.mp4
    04:15
  • 1. Ubuntu Desktop Navigation.mp4
    02:33
  • 2. FireFox Web Browser Security.mp4
    03:52
  • 3. Ubuntu Software Center.mp4
    01:41
  • 4. Ubuntu Settings.mp4
    07:05
  • 5. Ubuntu Applications Menu.mp4
    01:29
  • 1. Introduction to The Terminal.mp4
    02:12
  • 2. The File System and Shell.mp4
    03:32
  • 3. Printing Working Directories and Clearing.mp4
    01:57
  • 4. Seeing Command History.mp4
    00:52
  • 5. Changing Directories.mp4
    03:21
  • 6. Grabbing Help with Command Usage.mp4
    01:59
  • 7. Listing Information.mp4
    05:13
  • 8. Introduction to File Permissions.mp4
    03:13
  • 1. Creating Files and Hidden Files.mp4
    01:32
  • 2. Making Directories and Hidden Directories.mp4
    01:13
  • 1. Identifying File Types.mp4
    02:15
  • 2. The Nano Text Editor.mp4
    02:12
  • 3. The GEDIT Text Editor and SUDO.mp4
    04:27
  • 4. Installing and Removing Software.mp4
    01:14
  • 5. Cat, Head, Less, More, and Tail Commands.mp4
    03:11
  • 6. Using Grep and Pipes with Commands.mp4
    03:33
  • 7. File Redirections and Echo.mp4
    03:22
  • 1. Copying Files and Directories.mp4
    01:08
  • 2. Moving Files and Directories.mp4
    00:51
  • 3. Renaming Files and Directories.mp4
    00:51
  • 4. Removing Files and Directories.mp4
    01:22
  • 1. Discovering Environment Variables.mp4
    05:58
  • 1.1 RESOURCE 7.1.docx
  • 1. Change File Permissions.mp4
    02:05
  • 2. Creating Executable Files (Scripts).mp4
    03:32
  • 1. Administering Users through GUI.mp4
    03:16
  • 2. Administering Users Through CLI.mp4
    04:23
  • 3. Administering Groups Through CLI.mp4
    02:02
  • 4. The Passwd File.mp4
    04:13
  • 5. The Group File.mp4
    02:34
  • 6. The Shadow File.mp4
    02:37
  • 7. Securing The ROOT Account.mp4
    04:59
  • 8. Guest Account and Login Screen.mp4
    02:08
  • 1. The Sudoers File.mp4
    03:02
  • 2. Adding Entries to Sudoers.mp4
    03:04
  • 1. Updating and Upgrading GUI.mp4
    03:44
  • 2. Updating and Upgrading CLI.mp4
    02:52
  • 3. Stringing Commands Together Without &&.mp4
    02:05
  • 1. Configuring Services.mp4
    05:10
  • 2. Configure, Secure, Connect to SSH.mp4
    07:47
  • 1. UFW Usage, Rules, and Logging GUICLI.mp4
    05:39
  • 1. Obtaining IP Addressing Information.mp4
    03:22
  • 2. The Hosts Files.mp4
    01:23
  • 3. Monitoring Connections on Network.mp4
    04:27
  • 1. Task Management in GUI.mp4
    02:49
  • 2. Task Management in CLI.mp4
    03:33
  • 1. Automation with Cron Jobs.mp4
    05:42
  • 2. Automate with Your Own Commands.mp4
    02:27
  • 1. Bash Scripting Fundamentals.mp4
    06:10
  • 2. String Concatenation.mp4
    03:18
  • 3. Accepting User Inputs.mp4
    03:29
  • 4. IF, ELIF, ELSE Statements.mp4
    05:42
  • 5. Operators and Simple Maths.mp4
    03:32
  • 6. FOR Loops.mp4
    03:52
  • 7. Evaluating And & OR.mp4
    03:20
  • 8. While Loops.mp4
    02:25
  • 1. Login Policy.mp4
    04:09
  • 2. Account Lockout Policy.mp4
    02:12
  • 3. Password Policy and Course Finish.mp4
    03:10
  • Description


    Advance Your Career as a Linux Professional with this Comprehensive Guide

    What You'll Learn?


    • You will learn how to function as a Linux Administrator and Security professional.
    • You will be better prepared for Industry Recognized certifications such as CompTIA Linux+, LPI Linux Essentials, and Redhat Certifications.
    • You will understand how to configure and secure the Ubuntu 22.04 LTS operating system.
    • You will have a strong foundation to pivot to begin ethical hacking learning objectives.
    • You will be introduced to basic shell scripting with the BASH language.
    • You will gain a unique, comprehensive experience, that is tailored to ease of learning with little fluff.
    • You will learn how to create, configure, secure, and connect to Secure Shell servers (SSH).
    • You will learn basic Computer and Network security fundamentals that other courses don't teach.

    Who is this for?


  • Anyone who wants to become an advanced user with Linux operating systems.
  • Anyone who wants to earn Linux Industry Recognized certifications.
  • Anyone who wants to enter IT / Cyber Security.
  • Anyone who wants hands on training in a lab environment to add to their experiences.
  • Anyone who is looking to add greater professional value to their portfolio.
  • Up and coming / Aspiring Junior Linux Systems Administrators
  • More details


    Description

    Are you looking to begin a career in Information Technology, Cyber Security, or Systems Administration? If so, learning Linux Administration and Security is an essential step.


    Linux is one of the most highly sought-after skills by employers and there is an immediate need for people who have these skills in these career fields. In fact, the majority of all infrastructure running the world runs on Linux/Unix systems.


    By gaining exposure and experience with the Linux operating system, from a beginner level to a more advanced level, you'll be giving yourself a competitive advantage in the job market.


    Our Linux administration and security course is designed to help you become an advanced user of Linux that goes beyond just simple command line introductions.


    You'll learn from experienced professionals how to use the Linux operating system to its full potential and gain a thorough understanding of computer and network security concepts that are industry standards.


    Not only will this course give you valuable hands-on experience with Linux, it will also help you prepare for industry-recognized certifications such as CompTIA Linux+, CySA+, CASP+, PenTest+, LPI Linux Essentials, and RedHat Certifications. There is no better way to complement your academic studies with real-world experience and practice.


    By learning Linux, you'll also be setting the foundations for acquiring other skills, such as setting up ideal developer environments or pivoting into learning how to become an ethical hacker. And by gaining experience with this operating system, you'll be able to elevate your professional value and set yourself apart from other candidates who may lack a defined experience with Linux.


    Don't miss out on this opportunity to gain valuable skills and experience that can help you succeed in a rewarding career in Information Technology, Cyber Security, or Systems Administration. Sign up for our Linux administration and security course now and take the first step towards a successful career in this exciting and in-demand field.

    Who this course is for:

    • Anyone who wants to become an advanced user with Linux operating systems.
    • Anyone who wants to earn Linux Industry Recognized certifications.
    • Anyone who wants to enter IT / Cyber Security.
    • Anyone who wants hands on training in a lab environment to add to their experiences.
    • Anyone who is looking to add greater professional value to their portfolio.
    • Up and coming / Aspiring Junior Linux Systems Administrators

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Alexander Commodore
    Alexander Commodore
    Instructor's Courses
    Alexander founded CyberWired Training in order to provide awareness and support to those entering and present in the IT and Cybersecurity Industry.He has 5+ years of experience teaching to JROTC students and continuing education students: Linux, Windows, Digital Forensics, and Virtualization. Experience working for a defense contractor to recruit for Information Technology positions. Is in the Top 1% in the 6000s of TryHackMe for ethical hacking experiences. Maintains the AWS Cloud Practitioner and Solutions Architect Associate as well as CompTIA: Security+, Network+, Linux+, CySA+, PenTest+, and CASP+. He is also a former national finalist of the CyberPatriot competition where he's gained experience in defending against an active red-team tasked with protecting virtualized critical infrastructure.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 64
    • duration 3:26:37
    • Release Date 2023/01/24