Table of contents
Introduction
7mins
Lock icon
Introduction to the LFCS | 2m
Lock icon
About This Course | 1m
Lock icon
About the Author | 1m
Lock icon
About the Exam | 1m
Essential Commands
267mins
Lock icon
Search for Files Part 1 - Find/Locate | 9m
Lock icon
Search for Files Part 2 - Which/Whereis/Type | 4m
Lock icon
Evaluate and Compare the Basic File System Features and Options | 7m
Lock icon
Compare and Manipulate File Content and Use Input-Output Redirection Part 1 - Create Files/Input-Output | 9m
Lock icon
Compare and Manipulate File Content and Use Input-Output Redirection Part 2 - Compare Files (Diff/Compare/CMP) | 9m
Lock icon
Use Input-Output Redirection (e.g. >, >>, |, 2>) | 8m
Lock icon
Analyze Text Using Basic Regular Expressions | 8m
Lock icon
Archive, Backup, Compress, Unpack, and Decompress Files | 7m
Lock icon
Create, Delete, Copy, and Move Files and Directories | 7m
Lock icon
Create and Manage Hard and Soft Links | 8m
Lock icon
List, Set, and Change Standard File Permissions | 8m
Lock icon
Manage Access to the root Account | 8m
Lock icon
Read and Use System Documentation | 4m
Lock icon
Archiving Files and Directories with Compression | 30m
Lock icon
Using File Attributes and Permissions | 30m
Lock icon
Finding Files, and Assigning Permissions and Ownership | 45m
Lock icon
Transfer Files Securely Over the Network | 1h 0m
Operation of Running Systems
306mins
Lock icon
Boot, Reboot, and Shut Down a System Safely | 5m
Lock icon
Boot or Change System into Different Operating Modes | 4m
Lock icon
Install, Configure, and Troubleshoot Boot-Loaders | 5m
Lock icon
Diagnose and Manage Processes | 8m
Lock icon
Locate and Analyze System Log Files | 5m
Lock icon
Schedule Tasks to Run at a Set Date and Time | 7m
Lock icon
Verify Completion of Scheduled Jobs | 4m
Lock icon
Update and Manage Software to Provide Required Functionality and Security, Part 1 - Ubuntu/Debian | 8m
Lock icon
Update and Manage Software to Provide Required Functionality and Security, Part 2 - CentOS/Redhat | 8m
Lock icon
Verify the Integrity and Availability of Resources | 5m
Lock icon
Verify the Integrity and Availability of Key Processes | 9m
Lock icon
Change Kernel Runtime Parameters, Persistent and Non-Persistent | 6m
Lock icon
Use Scripting to Automate System Maintenance Tasks | 4m
Lock icon
Scripting Conditionals and Loops Part 1 - Operators/If | 6m
Lock icon
Scripting Conditionals and Loops Part 2 - For/While/Until | 5m
Lock icon
Manage the Startup Process and Services (In Services Configuration) | 5m
Lock icon
List and Identify SELinux/AppArmor File and Process Contexts | 8m
Lock icon
Managing Packages on Debian and Ubuntu Systems | 45m
Lock icon
Managing Packages on RedHat/CentOS Systems | 1h 0m
Lock icon
Using a Oneshot Systemd Service | 45m
Lock icon
Creating a Cronjob to Run a Script Periodically | 45m
User and Group Management
168mins
Lock icon
Create, Delete, and Modify Local User Accounts | 9m
Lock icon
Create, Delete, and Modify Local Groups and Group Memberships | 8m
Lock icon
Manage System-Wide Environment Profiles | 7m
Lock icon
Manage Template User Environment | 4m
Lock icon
Configure User Resource Limits | 5m
Lock icon
Manage User Privileges | 5m
Lock icon
Configure PAM | 7m
Lock icon
Managing User and Group Accounts | 1h 0m
Lock icon
Enabling su/sudo Access with Wheel Group | 1h 0m
Networking
141mins
Lock icon
Configure Networking and Hostname Resolution Statically or Dynamically | 9m
Lock icon
Configure Network Services to Start Automatically at Boot | 3m
Lock icon
Implement Packet Filtering | 5m
Lock icon
Start, Stop, and Check the Status of Network Services | 5m
Lock icon
Statically Route IP Traffic | 7m
Lock icon
Synchronize Time Using Other Network Peers | 4m
Lock icon
Adding an IP Address and a Static Route | 1h 0m
Lock icon
Synchronizing Time with NTP | 45m
Service Configuration
338mins
Lock icon
Configure a Caching DNS Server | 5m
Lock icon
Maintain a DNS Zone | 9m
Lock icon
Configure Email Aliases | 5m
Lock icon
Configure SSH Servers and Clients | 7m
Lock icon
Restrict Access to HTTP Proxy Servers | 4m
Lock icon
Configure an IMAP and IMAPS Service (and Pop3 and Pop3S) | 6m
Lock icon
Query and Modify the Behavior of System Services at Various Operating Modes | 6m
Lock icon
Configure an HTTP Server (Ubuntu/Debian) | 6m
Lock icon
Configure HTTP Server Log Files | 5m
Lock icon
Restrict Access to a Web Page | 7m
Lock icon
Configure a Database Server | 5m
Lock icon
Manage and Configure Containers | 7m
Lock icon
Manage and Configure Virtual Machines | 6m
Lock icon
Using SSH Keys for Secure Access | 30m
Lock icon
Managing Docker Containers | 1h 0m
Lock icon
Configuring Outgoing Mail Server | 45m
Lock icon
Securing the MariaDB Database Server | 1h 0m
Lock icon
Deploying Apache Web Server on RedHat/CentOS | 1h 0m
Storage Management
260mins
Lock icon
List, Create, Delete, and Modify Physical Storage Partitions | 7m
Lock icon
Manage and Configure LVM Storage Part 1 - Create LVM | 6m
Lock icon
Manage and Configure LVM Storage Part 2 - Extend LVM | 8m
Lock icon
Create and Configure Encrypted Storage | 6m
Lock icon
Configure Systems to Mount File Systems at or During Boot | 5m
Lock icon
Configure and Manage Swap Space | 7m
Lock icon
Create and Manage RAID Devices | 9m
Lock icon
Configure Systems to Mount File Systems on Demand | 6m
Lock icon
Create, Manage, and Diagnose Advanced File System Permissions | 8m
Lock icon
Set up User and Group Disk Quotas for File Systems | 7m
Lock icon
Create and Configure File Systems | 7m
Lock icon
Creating and Mounting an Encrypted Filesystem | 1h 0m
Lock icon
Working with Logical Volume Management | 1h 0m
Lock icon
Managing Swap Files and Partitions | 1h 0m
Lock icon
| 0m
Conclusion
4mins
Lock icon
Registering for and Taking the Exam | 3m
Lock icon
What's Next | 1m
About the author
A Cloud Guru
The Cloud Content team comprises subject matter experts hyper focused on services offered by the leading cloud vendors (AWS, GCP, and Azure), as well as cloud-related technologies such as Linux and DevOps. The team is thrilled to share their knowledge to help you build modern tech solutions from the ground up, secure and optimize your environments, and so much more!
More Courses by A G.
Get access now
Sign up to get immediate access to this course plus thousands more you can watch anytime, anywhere
Cancel
Close button icon