Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Fundamentals of Unix and Linux System Administration
Introduction
Introduction (2:50)
Where to Start
Linux Unix Administration Fundamentals (6:47)
Getting help on Linux (8:37)
Advance man command (12:30)
Package Management
Introduction to package management (15:13)
Installing from RPM (10:56)
Making a local apt-get repo (12:31)
Making local yum repo (16:21)
Tips and tricks (11:07)
Shell Scripting Guide
Introduction to shell scripting (19:40)
Using variables (14:53)
The sort command (19:39)
Basics of BASH Script (14:39)
Shell Functions (15:14)
Looping (13:50)
Perl (10:06)
Perl Arrays (10:08)
Perl Script Arguments (16:41)
Python Scripting - Part A (10:10)
Python Scripting - Part B (11:00)
Booting and Shutting Down
Starting up and Shutting Down Machines (12:37)
Startup Daemons (18:28)
Booting a second OS (13:29)
System Run levels (15:36)
Lab Exercise: Creating a custom Daemon (19:27)
User Access Control
User Access Control Fundamentals (17:16)
The Power of Root (16:54)
Delegating Root Powers with Sudo (10:07)
Delegating Root Powers with Sudo - Part B (11:31)
System Accounts (4:55)
Controlling Processes
Process Control Fundamentals (10:05)
Ownership (10:35)
Process Spawning and Termination (15:05)
Terminating a process (16:16)
Using the /proc filesystem (9:40)
The File System
The File System Fundamentals (17:26)
Important Directories (14:26)
Device File Numbers (15:56)
File Deletion with RM (18:16)
What do permissions offer? (14:31)
Changing File ownership (19:28)
Adding New Users
User Management Part A (10:14)
User Management Part B (12:10)
UID - User Identification (18:58)
The login shell (15:06)
The useradd command (16:02)
Storage
Storage (18:34)
The basics - adding a disk Part A (10:07)
The basics - adding a disk Part B (12:03)
Redundant Array of Inexpensive Disks (RAID) (14:42)
LAB: create a RAID5 array on Red Hat Linux (12:26)
Logical Volume Management (LVM) (18:21)
Logical volume resizing Part A (8:53)
Logical volume resizing Part B (11:53)
SCSI ovet IP (iSCSI) (12:34)
Periodic Processes
Cron and at jobs (14:39)
The command field (12:39)
The crontab command (13:13)
The at command (12:26)
Backups
Backups part A (10:45)
Backups part B (11:21)
LAB: Calculate the frequency by which file change (17:39)
Using tar (19:08)
Using dump Part A (18:58)
Using dump Part B (7:56)
Syslog and Log files
Log management (13:07)
Severity levels (11:19)
Lab: using logAnalyzer for central log management (13:41)
Log rotation (15:25)
TCP/IP Networking
TCP/IP overview (16:38)
the Link layer (18:26)
Classless Inter Domain Routing (CIDR) (15:06)
Routing (16:33)
Netfilter and IP tables
Netfilter (16:07)
The LOG action (17:02)
IP tables configuration (11:42)
Lab: configure a Linux box to act as a NAT device (12:17)
DNS: The Domain name system
DNS (14:12)
Caching Part A (10:04)
Caching Part B (12:09)
LAB: install a caching server (5:44)
LAB: install a master DNS server (13:18)
LAB: Configure DNS slave Server (4:46)
The Network File System
NFS (17:34)
Effecting changes (11:44)
Using the shares (11:09)
Mounting on demand (9:17)
Sharing files with Windows
SAMBA (7:19)
Allowing access through iptable (12:11)
LAB; creating and using a SAMBA share (3:54)
Email Services
E-mail services (12:34)
LAB: configuring a mail server using Postfix (16:48)
Network management and debugging
Network Analysis and Troubleshooting (20:32)
Connection states (8:46)
Sniffing on the network (14:58)
Security
Linux Security (15:22)
how to secure your system? (14:11)
Scan for open ports (nmap) (9:34)
SSH tips and tricks
Ssh tips and tricks (11:52)
key-based authentication (19:00)
tunneling application traffic (22:29)
Web Hosting
Web Hosting (11:49)
The Apache web server (16:23)
Secure HTTP (https) (8:36)
Performance Analysis
Performance Analysis (5:09)
Check your resources (8:00)
Memory management (10:53)
The LOG action
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock