CA02 - CompTIA Linux+ Certification - 5 Days

Course Description


Customisation

For on-site courses (i.e. at your premises), we are more than happy to tailor the course agenda to suit your exact requirements. In many cases, we are able to build your in-house standards and naming conventions into the delivered course.


Course Details

Hardware and System Configuration

Explain Linux boot process concepts
Boot loaders
Boot options
File locations
Boot modules and files
Kernel panic

Given a scenario, install, configure, and monitor kernel modules
Commands
Locations

Given a scenario, configure and verify network connection parameters
Diagnostic tools
Configuration files
Bonding

Given a scenario, manage storage in a Linux environment
Basic partitions
File system hierarchy
Device mapper
Tools
Location
File system types

Compare and contrast cloud and virtualization concepts and technologies
Templates
Bootstrapping
Storage
Network considerations
Types of hypervisors
Tools

Given a scenario, configure localization options
File locations
Commands
Environment variables
Character sets

Systems Operation and Maintenance

Given a scenario, conduct software installations, configurations, updates, and removals
Package types
Installation tools
Build tools
Repositories
Acquisition commands

Given a scenario, manage users and groups
Creation
Modification
Deletion
Queries
Quotas
Profiles
Important files and file contents

Given a scenario, create, modify, and redirect files
Text editors
File readers
Output redirection
Text processing
File and directory operations

Given a scenario, manage services
Systemd management
SysVinit

Summarize and explain server roles
NTP
SSH
Web
Certificate authority
Name server
DHCP
File servers
Authentication server
Proxy
Logging
Containers
VPN
Monitoring
Database
Print server
Mail server
Load balancer
Clustering

Given a scenario, automate and schedule jobs
cron
at
crontab
fg
bg
&
kill
Ctrl+c
Ctrl+z
nohup

Explain the use and operation of Linux devices
Types of devices
Monitoring and configuration tools
File locations
Hot pluggable devices

Compare and contrast Linux graphical user interfaces
Servers
GUI
Remote desktop
Console redirection
Accessibility

Security

Given a scenario, apply or acquire the appropriate user and/or group permissions and ownership
File and directory permissions
Context-based permissions
Privilege escalation
User types

Given a scenario, configure and implement appropriate access and authentication methods
PAM
SSH
TTYs
PTYs
PKI
VPN as a client

Summarize security best practices in a Linux environment
Boot security
Additional authentication methods
Importance of disabling root login via SSH
Password-less login
Chroot jail services
No shared IDs
Importance of denying hosts
Separation of OS data from application data
Change default ports
Importance of disabling or uninstalling unused and unsecure services
Importance of enabling SSL/TLS
Importance of enabling auditd
CVE monitoring
Discouraging use of USB devices
Disk encryption
Restrict cron access
Disable Ctrl+Alt+Del
Add banner
MOTD

Given a scenario, implement logging services
Key file locations
Log management
lastb

Given a scenario, implement and configure Linux firewalls
Access control lists
Technologies
IP forwarding
Dynamic rule sets
Common application firewall configurations

Given a scenario, backup, restore, and compress files
Archive and restore utilities
Compression
Backup types
Off-site/off-system storage
Integrity checks

Linux Troubleshooting and Diagnostics

Given a scenario, analyze system properties and remediate accordingly
Network monitoring and configuration
Storage monitoring and configuration
CPU monitoring and configuration
Memory monitoring and configuration
Lost root password

Given a scenario, analyze system processes in order to optimize performance
Process management

Given a scenario, analyze and troubleshoot user issues
Permissions
Access
Authentication
File creation
Insufficient privileges for authorization
Environment and shell issues

Given a scenario, analyze and troubleshoot application and hardware issues
SELinux context violations
Storage
Firewall
Permission
Dependencies
Troubleshooting additional hardware issues

Automation and Scripting

Given a scenario, deploy and execute basic BASH scripts
Shell environments and shell variables
#!/bin/bash
Sourcing scripts
Directory and file permissions
Extensions
Commenting
File globbing
Shell expansions
Redirection and piping
Exit codes
Metacharacters
Positional parameters
Looping constructs
Conditional statements
Escaping characters

Given a scenario, carry out version control using Git
Arguments
Files

Summarize orchestration processes and concepts
Agent
Agentless
Procedures
Attributes
Infrastructure automation
Infrastructure as code
Inventory
Automated configuration management
Build automation


Course Enquiry