Table of contents
Introduction
4mins
Lock icon
About the Course | 0m
Lock icon
About the Author | 0m
Lock icon
About the Exam | 2m
Essential Commands
86mins
Lock icon
Use Version Control Tools | 10m
Lock icon
Manipulate File Content Programmatically | 4m
Lock icon
Run Commands on Many Systems Simultaneously | 4m
Lock icon
Install Linux Distribution | 7m
Lock icon
Using Git for Source Control and Programming | 1h 0m
Operation of Running Systems
312mins
Lock icon
Develop and Test Disaster Recovery Plans | 9m
Lock icon
Monitor, Tune and Troubleshoot System Performance (top, vmstat, lsof, tcpdump, netstat, ss, htop, iotop, iostat) | 8m
Lock icon
Monitor, Tune, and Troubleshoot System Performance (iftop, nethogs, iptraf) | 4m
Lock icon
Update the Kernel and Ensure the System is Bootable | 7m
Lock icon
Script Automation Tools to Make Work Faster and More Accurate | 5m
Lock icon
Train Team Members on New Technology or Changes to Existing Systems | 5m
Lock icon
Maintain Systems via Configuration Management Tools | 14m
Lock icon
Maintain the Integrity and Availability of Hardware | 6m
Lock icon
Update Operating Systems to Provide Required Functionality and Security | 12m
Lock icon
Support Incident Management for Outages/Trouble | 7m
Lock icon
Produce and Deliver Reports on System Use (Processor, Memory, Disk, and Network), Outages, and User Requests | 9m
Lock icon
Monitor Security and Conduct Audits | 10m
Lock icon
Manipulate Linux System During the Recovery Process | 8m
Lock icon
Use udev for Device Detection and Management | 7m
Lock icon
Configure and Modify SELinux/AppArmor Policies | 14m
Lock icon
Display and Restore File and Directory Security Contexts with SELinux | 1h 0m
Lock icon
Create and Deliver a Report on System Utilization | 1h 0m
Lock icon
Updating Different Linux Distribution Types | 1h 0m
User and Group Management
80mins
Lock icon
Connect to an External Authentication Source | 7m
Lock icon
Configure Advanced PAM | 13m
Lock icon
OpenLDAP Client User Authentication | 1h 0m
Networking
176mins
Lock icon
Monitor, Tune and Troubleshoot Network Performance | 16m
Lock icon
Configure Network Traffic Tunneling | 10m
Lock icon
Configure a System to Perform Network Address Translation | 7m
Lock icon
Dynamically Route IP Traffic | 4m
Lock icon
Implement Advanced Packet Filtering | 17m
Lock icon
Create and Use an SSH Tunnel for Network Traffic | 1h 0m
Lock icon
Using 'firewalld' for Advanced Packet Filtering | 1h 0m
Service Configuration
262mins
Lock icon
Implement and Configure an HTTP Server | 13m
Lock icon
Implement and Configure Time Synchronization Server | 7m
Lock icon
Implement and Configure Network Logging Server | 8m
Lock icon
Configure a DHCP Server | 6m
Lock icon
Implement and Configure an SMTP Service | 6m
Lock icon
Implement and Configure the HTTP Proxy Server | 5m
Lock icon
Configure Host-based and User-based Security for a Service | 6m
Lock icon
Implement and Configure a Centralized Authentication Server | 17m
Lock icon
Implement and Configure a PXE Boot Server | 11m
Lock icon
Implement and Configure an Authoritative DNS Server | 16m
Lock icon
Implement and Configure an Authoritative DNS Server - DNS Views | 11m
Lock icon
Install and Configure an HTTP Server (Apache) | 30m
Lock icon
Configure and Use an SMTP Server for Email Forwarding | 1h 0m
Lock icon
Configuring a Service with Host Based Security Restrictions | 1h 0m
Storage Management
233mins
Lock icon
Manage Advanced LVM Configuration (Part 1) | 13m
Lock icon
Manage Advanced LVM Configuration (Part 2) | 14m
Lock icon
Identify Storage Devices Using Block Device Attributes | 4m
Lock icon
Manage Linux File System Features and Flags | 9m
Lock icon
Implement and Configure Remote Block Storage Devices | 13m
Lock icon
Implement and Configure Network Shares - Samba | 13m
Lock icon
Setting Up LVM Partitions in Linux | 1h 0m
Lock icon
Working with iSCSI Target and Initiator to Mount on Clients | 45m
Lock icon
Implement SAMBA (CIFS) Fileshares for Servers and Clients | 1h 0m
System Design and Deployment
438mins
Lock icon
Define a Capacity Planning Strategy | 10m
Lock icon
Conduct Post Deployment Verifications | 5m
Lock icon
Create and Maintain Software Packages | 17m
Lock icon
Create, Configure and Maintain Containers | 11m
Lock icon
Create, Configure and Maintain Containers - CentOS | 7m
Lock icon
Deploy, Configure, and Maintain High Availability/Clustering/Replication | 8m
Lock icon
Deploy, Configure, and Maintain High Availability/Clustering/Replication - PCS, Corosync, Pacemaker | 18m
Lock icon
Install and Configure LXC/LXD for Container Management | 30m
Lock icon
Instantiating Containers from Base Images with LXC/LXD | 30m
Lock icon
Creating a Package from Source | 1h 0m
Lock icon
Linux System Engineer Final Review | 4h 0m
Conclusion
3mins
Lock icon
Conclusion | 3m
About the author
A Cloud Guru
The Cloud Content team comprises subject matter experts hyper focused on services offered by the leading cloud vendors (AWS, GCP, and Azure), as well as cloud-related technologies such as Linux and DevOps. The team is thrilled to share their knowledge to help you build modern tech solutions from the ground up, secure and optimize your environments, and so much more!
More Courses by A G.
Get access now
Sign up to get immediate access to this course plus thousands more you can watch anytime, anywhere
Cancel
Close button icon