Companies Home Search Profile

Linux Administration: The Complete Linux Training Course

Focused View

The Linux Lighthouse

25:39:25

161 View
  • 001 Welcome !.mp4
    01:05
  • 002 What is Linux.mp4
    05:52
  • 003 Why Linux.mp4
    06:21
  • 004 Section 1 Technical Terms Glossary.html
  • 001 Install VirtualBox on Windows.mp4
    03:05
  • 002 Create our first virtual machine.mp4
    03:44
  • 003 Add New Virtual Hard Disk.mp4
    02:08
  • 004 Why Rocky Linux and its relation to centOS and RedHat.mp4
    01:36
  • 005 Install Rocky 9.0 (Redhat & CentOS compatible).mp4
    06:12
  • 006 Port Forwarding - NAT - Network issue solution.mp4
    04:25
  • 001 Accessing the Command Line.mp4
    06:43
  • 002 Linux File System Hierarchy.mp4
    05:53
  • 003 Create Files & Directories.mp4
    07:18
  • 004 Find Your Way In Linux.mp4
    10:25
  • 005 Copy, Move, Rename & Delete Files.mp4
    10:00
  • 006 Copy, Move, Rename & Delete Directories.mp4
    07:52
  • 007 Get Help with Manual Pages.mp4
    10:05
  • 008 Get Help with Pinfo.mp4
    03:41
  • 009 Read Linux Documentation.mp4
    06:29
  • 010 Use Input & Output redirection.mp4
    19:11
  • 011 Create & Edit Text Files.mp4
    12:16
  • 012 Access Remote Systems Using SSH.mp4
    14:58
  • 013 Archive, Compress, Unpack & Uncompress Files.mp4
    18:14
  • 014 Create Hard & Soft Links.mp4
    15:17
  • 015 Finding Files.mp4
    14:48
  • 001 Create Local Users & Local Groups.mp4
    20:02
  • 002 Gain Super Powers.mp4
    09:20
  • 003 Modify Users, Groups & Password Aging.mp4
    19:13
  • 004 Configure A System To Use An Existing Authentication Service.mp4
    03:19
  • 005 Notation Permissions.mp4
    14:05
  • 006 Symbolic Permissions.mp4
    22:04
  • 007 Special Permissions.mp4
    25:39
  • 001 Monitor Running Processes with ps Command.mp4
    09:18
  • 002 Run Processes in the Background.mp4
    07:47
  • 003 Terminate Running Processes with Kill & Pkill.mp4
    16:37
  • 004 Monitoring Running System with top.mp4
    10:31
  • 005 Listing Unit Files with systemctl.mp4
    10:38
  • 006 Start, Stop & Check The status of a Linux Service.mp4
    10:13
  • 007 The Truth About System Log.mp4
    06:29
  • 008 The rsyslog.mp4
    12:31
  • 009 The SystemD Journal.mp4
    10:54
  • 010 SystemD Journal Preservation.mp4
    04:44
  • 011 Boot, Reboot And Shut Down A System Normally.mp4
    05:26
  • 012 Boot Systems Into Different Targets Manually.mp4
    07:40
  • 013 Interrupt The Boot Process To Gain Access To A System.mp4
    06:15
  • 014 Adjust Process Priority With Renice.mp4
    04:27
  • 001 Examining the File System.mp4
    06:44
  • 002 Mounting & Unmounting File System.mp4
    06:54
  • 003 Create, Mount, Unmount And Use Vfat, ext4 And xfs File Systems.mp4
    13:53
  • 004 Mount and Unmount CIFS and NFS Network File Systems.mp4
    09:39
  • 005 Extend Existing Logical Volume.mp4
    12:48
  • 006 Create and manage Access Control Lists ACLs.mp4
    18:12
  • 007 Maintain Accurate Time with ntp.mp4
    06:59
  • 008 Validate Your Network Configuration.mp4
    12:16
  • 009 Configure Linux Network.mp4
    16:10
  • 010 Edit Network Configuration Files.mp4
    07:05
  • 011 Configuring Hostnames & Names Resolution.mp4
    10:06
  • 012 Install & Update Software with yum.mp4
    14:01
  • 013 Manage RPM Packages.mp4
    07:21
  • 014 Schedule Tasks Using at and cron.mp4
    26:24
  • 001 Configure Key-Based Authentication for SSH.mp4
    04:14
  • 002 Disallow User Root from Logging In Using SSH.mp4
    09:55
  • 003 Copying Files Securely Between Systems.mp4
    12:12
  • 004 Synchronize Files & Folders Securely Between Systems.mp4
    11:24
  • 005 Configure Firewall Settings Using Firewall-config & Firewall-cmd.mp4
    17:37
  • 006 Introduction To SElinux.mp4
    08:12
  • 007 List And Identify SElinux File And Process Context.mp4
    09:51
  • 008 Restore Default File Contexts.mp4
    10:18
  • 009 Use Boolean Settings To Modify System SElinux.mp4
    06:56
  • 010 Diagnose And Address Routine SElinux Policy Violation.mp4
    02:08
  • 001 Configure Aggregated Network Links Between 2 RHEL Systems or Interfaces.mp4
    08:45
  • 002 Configure IPv6 Addresses and Perform Basic IPv6 Troubleshooting.mp4
    04:11
  • 003 Firewalld - The rich rules.mp4
    05:01
  • 004 Configure Network Address Translation(NAT) - Masquerade.mp4
    03:05
  • 005 Configure Network Address Translation (NAT) - Port forwarding.mp4
    06:09
  • 006 Configure a system as an iSCSI target.mp4
    08:32
  • 007 Configure a system as an iSCSI initiator.mp4
    07:59
  • 008 Use procsys and sysctl to Modify or Set Kernel runtime parameters.mp4
    05:14
  • 009 Produce and deliver reports on system utilization(processor,memory,disk,network).mp4
    02:52
  • 001 Install the packages needed to provide the service.mp4
    03:18
  • 002 Configure SELinux to support the service.mp4
    02:22
  • 003 Use SELinux port labelling to allow services to use non-standard ports.mp4
    04:43
  • 004 Configure the service to start when the system is booted.mp4
    03:26
  • 005 Install and Configure Apache.mp4
    07:20
  • 006 Configure Apache access restrictions on directories.mp4
    05:47
  • 007 Configure Group Managed Content.mp4
    08:12
  • 008 Deploy a basic CGI application.mp4
    07:54
  • 009 Configure an Apache Virtual Host.mp4
    09:58
  • 010 Configure TLS security.mp4
    09:11
  • 011 The Apache Configuration File.mp4
    05:50
  • 012 Configure a Caching-Only Name Server.mp4
    03:26
  • 013 Provide network shares to specific clients.mp4
    13:52
  • 014 Provide network shares suitable for group collaboration.mp4
    05:52
  • 015 Use Kerberos to Control Access to NFS network shares (configure Kerberos).mp4
    17:41
  • 016 Use Kerberos to Control Access to NFS network shares ( Configure Nfs Server ).mp4
    12:04
  • 017 Provide Network Shares to Specific Clients-client installation and configuration.mp4
    12:49
  • 018 Provide Network Shares Suitable for Group Collaboration.mp4
    08:18
  • 019 Configure a system to forward all emails to a central mail server.mp4
    08:59
  • 020 Configure Key-Based Authentication.mp4
    08:13
  • 021 Configure Key-Based Authentication 2.mp4
    02:42
  • 022 Synchronize time using other NTP peers.mp4
    05:24
  • 023 Install and Configure MariaDB.mp4
    04:06
  • 024 Create a simple database schema.mp4
    05:48
  • 025 Backup database.mp4
    03:23
  • 026 Perform simple SQL queries against a database.mp4
    05:09
  • 027 Restore a MariaDB database.mp4
    02:35
  • 001 How to write a cover letter.mp4
    05:21
  • 002 CV Structure.mp4
    06:51
  • 001 Introduction To Secure Shell.mp4
    06:43
  • 002 How do I connect to a remote host.mp4
    06:10
  • 003 How do I connect to a remote host on a different SSH port.mp4
    05:38
  • 004 How can I login to a specific directory.mp4
    02:54
  • 005 How do I execute a command on a remote host using SSH.mp4
    02:49
  • 006 How can I copy (filefiles) to a remote host using SCP.mp4
    06:09
  • 007 How can I copy (filefiles) from a remote host using SCP.mp4
    02:53
  • 008 How can I Copy entire directory using SCP.mp4
    04:29
  • 009 Can I limit the speed (bandwidth) of files transfer using SCP.mp4
    03:55
  • 010 What is SFTP and how to connect to SFTP.mp4
    01:51
  • 011 SFTP List file and check the working directory.mp4
    03:44
  • 012 SFTP Uploading Files.mp4
    04:59
  • 013 SFTP Downloading Files.mp4
    03:47
  • 014 SFTP Switching and Creating Directories.mp4
    04:32
  • 015 SFTP Remove Files and Directories.mp4
    03:51
  • 016 Multiple SSH Sessions with screen (Install Screen).mp4
    04:06
  • 017 Multiple SSH Sessions with screen (Start working).mp4
    04:11
  • 018 Multiple SSH Sessions with screen Lock and Exit from the screen.mp4
    01:23
  • 019 Tunneling x11 Through SSH (Linux).mp4
    02:53
  • 020 Tunneling x11 Through SSH (Run Linux Applications on Windows).mp4
    02:39
  • 021 Remote Desktop with SSH (Install and Configure VNC Server).mp4
    05:37
  • 022 Remote Desktop with SSH (Connect to Remote Desktop).mp4
    01:57
  • 023 Change The Default Port.mp4
    06:00
  • 024 Disable Direct Root Access.mp4
    05:53
  • 025 Allow Access for Certain User(s).mp4
    04:57
  • 026 Deny Access from Known IPs.mp4
    03:01
  • 027 Allow Access from Known IPs.mp4
    07:58
  • 028 Public Key Authentication.mp4
    07:35
  • 029 Disable Password Authentication.mp4
    04:14
  • 001 Introduction to web server.mp4
    08:23
  • 002 Essentials.mp4
    05:17
  • 003 Install Apache using yum.mp4
    05:09
  • 004 Enable Apache to automatically start when system boot.mp4
    01:37
  • 005 Configure the firewall service.mp4
    02:48
  • 006 Where is Apache.mp4
    02:21
  • 007 Apache directory structure.mp4
    07:35
  • 008 Configuration file.mp4
    10:53
  • 009 Create your first page.mp4
    05:51
  • 010 Setting up the virtual host - name based.mp4
    06:42
  • 011 Setting up the virtual host - port based.mp4
    04:29
  • 012 Configuring an alias for a url.mp4
    04:13
  • 013 Redirects.mp4
    07:20
  • 014 The error log.mp4
    03:24
  • 015 The access log.mp4
    03:37
  • 016 Custom log.mp4
    09:10
  • 017 Log rotation.mp4
    04:04
  • 018 Basic Security - Part 1.mp4
    05:34
  • 019 Basic Security - Part 2.mp4
    06:24
  • 020 Set up TLSSSl for free.mp4
    06:21
  • 021 Basic authentication.mp4
    07:00
  • 022 Digest authentication.mp4
    04:10
  • 023 Access Control.mp4
    06:17
  • 024 .htaccess (Administrator Side).mp4
    02:30
  • 025 .htaccess (User Side).mp4
    06:07
  • 026 Authentication ( notes ).html
  • 027 Install and Configure antivirus.mp4
    05:47
  • 028 Mitigate dos attacks - mod evasive.mp4
    04:27
  • 029 Apache Multi-Processing Modules (MPMs).html
  • 030 Adjusting httpd.conf - Part 1.mp4
    03:26
  • 031 Adjusting httpd.conf - Part 2.mp4
    02:38
  • 032 Troubleshoot Apache (Analyze Access Log) - Part 1.mp4
    08:21
  • 033 Troubleshoot Apache (Analyze Access Log) - Part 2.mp4
    06:25
  • 034 Use Apachetop to monitor web server traffic.mp4
    03:52
  • 001 ChatGPT Fundamentals.html
  • 002 How to delete files that are older than x amount of days in Linux.mp4
    06:19
  • 003 Give me a cronjob that runs on the 3rd day of each month at 145 am.mp4
    03:01
  • 004 Create a self signed certificate by using OpenSSL.mp4
    06:19
  • 005 Install nginx latest version and laravel 7 then configure nginx as reverse proxy.mp4
    12:30
  • 006 Configure SSL for Laravel.mp4
    05:48
  • 007 Steps on how to install MariaDB, create database and username for Laravel.mp4
    06:31
  • 008 Configure firewalld.mp4
    05:51
  • 009 Restrict SSH login to a specific IP or host.mp4
    05:39
  • 010 Configure network to assign a static IP on Ubuntu 22.0.mp4
    05:26
  • 001 Vi editor part 1.mp4
    09:31
  • 002 Vi editor part 2.mp4
    07:37
  • 003 Create SWAP file and SWAP partition.mp4
    15:19
  • 004 Logical Volume Management (LVM).mp4
    30:58
  • 005 Software RAID.mp4
    22:13
  • 006 Process Managment.mp4
    20:19
  • 007 VMSTAT And IOSTAT.mp4
    07:16
  • 008 List Open Files (LSOF).mp4
    08:49
  • 009 Tcpdump.mp4
    13:00
  • 010 Search for Files on Linux using find and locate.mp4
    14:52
  • 011 Cat Command.mp4
    04:41
  • 012 Grep Command.mp4
    13:30
  • 013 AWK Command.mp4
    16:24
  • 014 HEAD Command.mp4
    18:19
  • 015 Network Clients (ssh , Scp , Ftp ,wget).mp4
    31:42
  • Description


    The TOP Linux Administration & Linux Command Line Course That Teaches You All About Linux & Prepares You For IT Jobs

    What You'll Learn?


    • By the end of this course you will be a professional in Linux administration and be able to apply for Linux jobs
    • You will have solid Linux skills and have great understanding of Linux concepts and fundamentals
    • You will master all of the important Linux commands
    • Acquire the technical expertise to work on the Linux command line
    • You will be able to troubleshoot day-to-day Linux related issues
    • You will gain advance Linux systems administration skills
    • You will gain knowledge of the most used Linux commands
    • Become an Independent User of the Linux Operating System
    • Feel comfortable using the command line interface
    • CentOS/Redhat versions 7, 8 and 9 and Rocky 8 and 9

    Who is this for?


  • Anyone who would like to learn Linux and seek a job in Linux.
  • Anyone interested in starting a career in Linux
  • Anyone who wants to learn how to use the Linux command line and master the skill
  • Anyone who wants to become a Linux system administrator
  • What You Need to Know?


  • This course covers all about Linux from square one, so no prior knowledge is required
  • A desire to pursue your objectives and goals
  • A computer (Windows, Mac, or Linux) with an Internet connection
  • More details


    Description

    WELCOME !         

    Welcome to the Linux Administration: The Complete Linux Training Course, the one course you need to learn all about Linux Administration, Linux Command Line and Linux in general to start your career in IT.

    The Linux operating system is the most preferred operating system in the corporate world and the great thing about Linux is that most of what you'll need to learn isn't very difficult at all. Linux is a key skill of IT, it provides good career opportunities with higher salaries, it's a free operating system and by learning Linux, you can use this Linux knowledge and apply it to roles like Linux System Administrator, DevOps Engineer, Cloud Architect, Network Administrator, Security Engineer, Backend Developer, Frontend Developer, Data Scientist, and much more. So if you want to learn Linux and be able to apply it in any of the roles mentioned above, then this course is for you !


    Course's Aim ?

    This course will teach you the Linux skills that will enable you to start your career in IT in any Linux based or related job and to provide you with all you need to apply for the job as a professional in Linux. After this course you won't be needing any other to start your career and that's because this course is designed to cover all the Linux aspects needed for you to start your career in IT.


    Who are we?

    We are M Torkey and M Khalil and we have been working with Linux for over a decade, along the years we've worked in so many companies as Sys Admins and DevOps Engineers and we have been given the opportunity to learn from experts and developed a lot of skills in the work field and henceforth we would present for you what you exactly need to skyrocket your chances of landing a job in IT and starting your career.

    In this course you'll learn the key commands, concepts and overall Linux skills that will help get you started in your journey.


    Why Linux ?

    Linux tends to be highly reliable and a more secure system than any other operating system (OS). Linux also is quite popular among many corporates and many consider it to be the lead operating system in the corporate world. Here are 5 reasons why you should start in Linux:

    1. Linux Provides Good Career Opportunities

    2. Much of the infrastructure that powers the internet, including routers and servers, is based on Linux

    3. Linux is Used on Nearly Every Server

    4. Linux is one such skill that allows an individual to experience a widespread growth in their profile after learning it

    5. Linux is free and open source


    What will be presented in this course ?

    The course is aimed to teach Linux to beginners, intermediates and even advanced Linux users who wish to develop their skills in Linux. Starting all the way from the Linux basics up to how to manage an entire platform.

    This is the list of topics that I will cover in this course:

    Section 1 - Introduction

    • Welcome !

    • What is Linux ?

    • Why Linux ?


    Section 2 - Prepare Your Lab

    • Install VirtualBox on Windows

    • Create our first virtual machine

    • Add New Virtual Hard Disk

    • Why Rocky Linux ? and it's relation to centOS and RedHat

    • Install Rocky 9.0 (Redhat & CentOS compatible)

    • Port Forwarding - NAT - Network issue solution


    Section 3 - Understand & Use Essential Tools

    • Accessing the Command Line

    • Linux File System Hierarchy

    • Create Files & Directories

    • Find Your Way In Linux

    • Copy, Move, Rename & Delete Files

    • Copy, Move, Rename & Delete Directories

    • Get Help with Manual Pages

    • Get Help with Pinfo

    • Read Linux Documentation

    • Use Input & Output redirection

    • Create & Edit Text Files

    • Access Remote Systems Using SSH

    • Archive, Compress, Unpack & Uncompress Files

    • Create Hard & Soft Links

    • Finding Files


    Section 4 - Linux System Administration (Chapter 1)

    • Create Local Users & Local Groups

    • Gain Super Powers

    • Modify Users, Groups & Password Aging

    • Configure A System To Use An Existing Authentication Service

    • Notation Permissions

    • Symbolic Permissions

    • Special Permissions


    Section 5 - Linux System Administration (Chapter 2)

    • Monitor Running Processes with ps Command

    • Run Processes in the Background

    • Terminate Running Processes with Kill & Pkill

    • Monitoring Running System with top

    • Listing Unit Files with systemctl

    • Start, Stop & Check The status of a Linux Service

    • The Truth About System Log

    • The rsyslog

    • The SystemD Journal

    • Boot, Reboot And Shut Down A System Normally

    • Boot Systems Into Different Targets Manually

    • Interrupt The Boot Process To Gain Access To A System

    • Adjust Process Priority With Renice


    Section 6 - Linux System Administration (Chapter 3)

    • Examining the File System

    • Mounting & Unmounting File System

    • Create, Mount, Unmount And Use Vfat, ext4 And xfs File Systems

    • Mount and Unmount CIFS and NFS Network File Systems

    • Extend Existing Logical Volume

    • Create and manage Access Control Lists ACLs

    • Maintain Accurate Time with ntp

    • Validate Your Network Configuration

    • Configure Linux Network

    • Edit Network Configuration Files

    • Configuring Hostnames & Names Resolution

    • Install & Update Software with yum

    • Manage RPM Packages

    • Schedule Tasks Using at and cron


    Section 7 - Linux  System Administration (Chapter 4)

    • Configure Key-Based Authentication for SSH

    • Disallow User Root from Logging In Using SSH

    • Copying Files Securely Between Systems

    • Synchronize Files & Folders Securely Between Systems

    • Configure Firewall Settings Using Firewall-config & Firewall-cmd

    • Introduction To SElinux

    • List And Identify SElinux File And Process Context

    • Restore Default File Contexts

    • Use Boolean Settings To Modify System SElinux

    • Diagnose And Address Routine SElinux Policy Violation


    Section 8 - Linux System Administration (Chapter 5)

    • Configure Aggregated Network Links Between 2 RHEL Systems or Interfaces

    • Configure IPv6 Addresses and Perform Basic IPv6 Troubleshooting

    • Firewalld - The rich rules

    • Configure Network Address Translation(NAT) - Masquerade

    • Configure Network Address Translation (NAT) - Port forwarding

    • Configure a system as an iSCSI target

    • Configure a system as an iSCSI initiator

    • Use procsys and sysctl to Modify or Set Kernel runtime parameters

    • Produce and deliver reports on system utilization(processor,memory,disk,network)


    Section 9 - Linux System Administration (Advanced Topics)

    • Install the packages needed to provide the service

    • Configure SELinux to support the service

    • Use SELinux port labelling to allow services to use non-standard ports

    • Configure the service to start when the system is booted

    • Install and Configure Apache

    • Configure Apache access restrictions on directories

    • Configure Group Managed Content

    • Deploy a basic CGI application

    • Configure an Apache Virtual Host

    • Configure TLS security

    • The Apache Configuration File

    • Configure a Caching-Only Name Server

    • Provide network shares to specific clients

    • Provide network shares suitable for group collaboration

    • Use Kerberos to Control Access to NFS network shares (configure Kerberos)

    • Use Kerberos to Control Access to NFS network shares ( Configure Nfs Server )

    • Provide Network Shares to Specific Clients-client installation and configuration

    • Provide Network Shares Suitable for Group Collaboration

    • Configure a system to forward all emails to a central mail server

    • Configure Key-Based Authentication

    • Configure Key-Based Authentication 2

    • Synchronize time using other NTP peers

    • Install and Configure MariaDB

    • Create a simple database schema

    • Backup database

    • Perform simple SQL queries against a database

    • Restore a MariaDB database


    Section 10 - Bonus 1: Secure Shell Deep Dive

    • Introduction To Secure Shell

    • How do I connect to a remote host

    • How do I connect to a remote host on a different SSH port

    • How can I login to a specific directory?

    • How do I execute a command on a remote host using SSH?

    • How can I copy (file/files) to a remote host using SCP?

    • How can I copy (file/files) from a remote host using SCP?

    • How can I Copy entire directory using SCP?

    • Can I limit the speed (bandwidth) of files transfer using SCP?

    • What is SFTP and how to connect to SFTP?

    • SFTP List file and check the working directory

    • SFTP Uploading Files

    • SFTP Downloading Files

    • SFTP Switching and Creating Directories

    • SFTP Remove Files and Directories

    • Multiple SSH Sessions with screen (Install Screen)

    • Multiple SSH Sessions with screen (Start working)

    • Multiple SSH Sessions with screen Lock and Exit from the screen

    • Tunneling x11 Through SSH (Linux)

    • Tunneling x11 Through SSH (Run Linux Applications on Windows)

    • Remote Desktop with SSH (Install and Configure VNC Server)

    • Remote Desktop with SSH (Connect to Remote Desktop)

    • Change The Default Port

    • Disable Direct Root Access

    • Allow Access for Certain User(s)

    • Deny Access from Known IPs

    • Allow Access from Known IPs

    • Public Key Authentication

    • Disable Password Authentication


    Section 11 - Bonus 2: Additional Lectures

    • Vi editor part 1

    • Vi editor part 2

    • Create SWAP file and SWAP partition

    • Logical Volume Management (LVM)

    • Software RAID

    • Process Managment

    • VMSTAT And IOSTAT

    • List Open Files (LSOF)

    • Tcpdump

    • Search for Files on Linux using find and locate

    • Cat Command

    • Grep Command

    • AWK Command

    • HEAD Command

    • Network Clients (ssh , Scp , Ftp ,wget)


    With that there will be  24 hour support for any questions or suggestions in the discussion forum 


    And now after this description you must be concerned on what are you going to get out of this course by the end ! 


    By the end of this course you will have the skills that will qualify you to apply for any Linux related job and be able to preform in real life situations.  

    ==========================================================================================

    For Assurance, check out what my students actually have to say about the course:


    "I've taken dozens of courses on Udemy with some really great content, but this if you only take one course, this is the one to take. thank you.!!!" - Edward W.  (5 Star Review)


    "Five Star All The Way!!! Thanks guys you are the best on Udemy! Well explained course and easy to understand in a reasonable time. After completing the first section I am confident that this course will provide everything I had hoped for and more" - canning G.  (5 Star Review)


    "Thank you very much for the course! I look forward to seeing more lectures, he did not waste a word. Buy this course if you want to succeed. Very understandable!!!"  - Kaichekanchap  (5 Star Review)

                                                 

    "Awesome dude!! great stuff, highly recommend. Simply Five Star. Thank you for showing us this innovative knowledge. It was extremely well educative" - Uppalakiran  (5 Star Review)


    "Simple and straightforward!!!!!! Wish I'd had access to a class like this years ago. The instructor are always here to help out, never had a problem to contact him regarding to the question in the course" - Sairepavan  (5 Star Review)


    "I have got more information about Linux, I would strongly recommend this course to all new professionals starting their career as a Linux administrator"  - Abhishek Kumar P.  (5 Star Review)


    "Great job!!! Best course on udemy. Simple and sweet description. Anyone who want to learn linux can go through it. It gave me exactly what I was looking for" - Nervinara  (5 Star Review)

    Who this course is for:

    • Anyone who would like to learn Linux and seek a job in Linux.
    • Anyone interested in starting a career in Linux
    • Anyone who wants to learn how to use the Linux command line and master the skill
    • Anyone who wants to become a Linux system administrator

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    The Linux Lighthouse
    The Linux Lighthouse
    Instructor's Courses
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 192
    • duration 25:39:25
    • English subtitles has
    • Release Date 2023/09/04