DevOps Bootcamp: Learn Linux & Become a Linux Sysadmin
24h 11m 36s
English
Paid
Course description
This DevOps Bootcamp will take you from an absolute beginner in Linux to getting hired as a confident and effective Linux System Administrator.
Read more about the course
- Everything you need to become a professional Linux Sysadmin and get hired
- Learn how to set up the Linux environment (installing both Ubuntu and CentOS in a virtual machine)
- For each Linux key concept or command, you'll also get a cheatsheet, quiz and practice exercises
- Understanding of Linux File Permissions, Processes, User Account Management, Linux Networking or Software Management
- Acquire a solid foundation of Netfilter/Iptables Linux Firewall (Chains, Tables, Matches, Targets)
- Master all of the key concepts and commands in Linux starting from scratch. No prior Linux knowledge is required
- Build a complete understanding of Linux OS (Distribution Independent) as a complete beginner
- Network Security & Ethical Hacking Key Concepts (Reconnaissance, Sniffing, Iptables Firewall and more)
- Ability to actually apply a deep understanding of Linux on real-world projects
Watch Online
Watch Online DevOps Bootcamp: Learn Linux & Become a Linux Sysadmin
0:00
/ #1: Course Outline
All Course Lessons (191)
| # | Lesson Title | Duration | Access |
|---|---|---|---|
| 1 | Course Outline Demo | 05:51 | |
| 2 | Linux Distributions | 06:57 | |
| 3 | Installing Ubuntu in a VM | 13:21 | |
| 4 | Things to Do After Installing Ubuntu | 10:17 | |
| 5 | Installing CentOS in a VM | 12:21 | |
| 6 | Migrating to Linux | 06:57 | |
| 7 | Terminals, Consoles, Shells and Commands | 09:34 | |
| 8 | Linux Command Structure | 06:56 | |
| 9 | Getting Help, Man Pages (man, type, help, apropos) | 11:10 | |
| 10 | Mastering the Terminal: The TAB Key | 06:43 | |
| 11 | Mastering the Terminal: Keyboard Shortcuts | 04:58 | |
| 12 | Mastering the Terminal: the Bash History | 08:41 | |
| 13 | Running Commands Without Leaving a Trace | 06:31 | |
| 14 | Recording the Date and Time for Each line in History | 02:42 | |
| 15 | root vs. non-Privileged Users. Getting root Access (sudo, su, passwd) | 11:25 | |
| 16 | Intro to The Linux Files System | 05:29 | |
| 17 | The Filesystem Hierarchy Standard ( FHS) | 09:40 | |
| 18 | Absolute vs. Relative Paths. Walking through the File System (pwd, cd, tree) | 13:11 | |
| 19 | The LS Command In Depth (ls) | 08:22 | |
| 20 | Understanding File Timestamps: atime, mtime, ctime (stat, touch, date) | 09:45 | |
| 21 | Sorting Files by Timestamp | 01:55 | |
| 22 | File Types in Linux (ls -F, file) | 07:33 | |
| 23 | Viewing Files - Part 1 (cat) | 04:29 | |
| 24 | Viewing Files - Part 2 (less, more) | 03:51 | |
| 25 | Viewing Files - Part 3 (tail, head, watch) | 06:18 | |
| 26 | Creating Files and Directories (touch, mkdir) | 07:11 | |
| 27 | Copying Files and Directories (cp) | 06:20 | |
| 28 | Moving and Renaming Files and Directories (mv) | 07:47 | |
| 29 | Removing Files and Directories (rm, shred) | 09:28 | |
| 30 | Working With Pipes in Linux (|, wc) | 08:08 | |
| 31 | Command Redirection (>, >>, 2> &>, cut, tee) | 14:32 | |
| 32 | Finding Files and Directories - Part 1 (locate, which) | 10:12 | |
| 33 | Finding Files and Directories - Part 2 (find) | 11:44 | |
| 34 | Find and Exec | 04:25 | |
| 35 | Searching for String Patterns in Text Files (grep) | 12:33 | |
| 36 | Searching for Strings in Binary Files (strings) | 03:40 | |
| 37 | Comparing Files (cmp, diff, sha256) | 09:55 | |
| 38 | The Basics of VIM Text Editor | 08:47 | |
| 39 | The VIM Editor In Depth - Part 1 | 08:57 | |
| 40 | The VIM Editor In Depth - Part 2 | 05:50 | |
| 41 | Compressing and Archiving Files and Directories (tar, gzip) | 14:16 | |
| 42 | Hard Links and the Inode Structure | 09:30 | |
| 43 | Working With Symlinks. Symlinks vs. Hard Links | 05:23 | |
| 44 | Understanding /etc/passwd and /etc/shadow files | 08:52 | |
| 45 | Understanding Linux Groups (groups, id) | 04:57 | |
| 46 | Creating User Accounts (useradd) | 08:18 | |
| 47 | Changing and Removing User Accounts (usermod, userdel) | 06:13 | |
| 48 | Creating Admin Users | 02:49 | |
| 49 | Group Management (groupadd, groupdel, groupmod) | 03:37 | |
| 50 | User Account Monitoring (whoami, who am i, who, id, w, uptime, last) | 07:22 | |
| 51 | Understanding File Permissions | 07:22 | |
| 52 | Octal (Numeric) Notation of File Permissions | 05:52 | |
| 53 | Changing File Permissions (chmod) | 09:00 | |
| 54 | The Effect of Permissions on Directories | 07:25 | |
| 55 | Combining Find and Chmod Commands Together | 03:32 | |
| 56 | Changing File Ownership (chown, chgrp) | 06:55 | |
| 57 | Understanding SUID (Set User ID) | 10:28 | |
| 58 | Understanding SGID (Set Group ID) | 05:54 | |
| 59 | Understanding the Sticky Bit | 05:41 | |
| 60 | Umask | 05:12 | |
| 61 | Understanding Files Attributes (lsattr, chattr) | 07:16 | |
| 62 | Processes and The Linux Security Model | 08:40 | |
| 63 | Listing Processes (ps, pstree) | 12:25 | |
| 64 | Getting a Dynamic Real-Time View of the Running System (top, htop) | 13:13 | |
| 65 | Signals and Killing Processes (kill, pkill, killall, pidof) | 11:28 | |
| 66 | Foreground and Background Processes | 04:39 | |
| 67 | Job Control (jobs, fg, bg | 07:28 | |
| 68 | Getting Information about the Network Interfaces (ip, ifconfig | 07:29 | |
| 69 | Configuring the Network On The Fly (ifconfig, ip, route) | 07:16 | |
| 70 | Setting Up Static IP on Ubuntu (netplan) | 07:39 | |
| 71 | Testing and Troubleshooting Network Connectivity | 09:50 | |
| 72 | Using SSH | 08:05 | |
| 73 | Troubleshooting SSH | 08:08 | |
| 74 | Securing the OpenSSH Server (sshd) | 11:37 | |
| 75 | Copying Files Over the Network (scp) | 12:02 | |
| 76 | Synchronizing Files and Directories using rsync | 11:57 | |
| 77 | Using rsync Over the Network | 06:52 | |
| 78 | Using wget | 09:32 | |
| 79 | Checking for Listening Ports (netstat, ss, lsof, telnet, nmap) | 09:38 | |
| 80 | DPKG (Debian and Ubuntu Based Distros) | 09:13 | |
| 81 | Intro to APT | 01:51 | |
| 82 | Using APT (Advanced Package Tool) | 12:00 | |
| 83 | Compiling Programs from Source Code vs. Package Manager | 04:59 | |
| 84 | Compiling C Programs | 03:29 | |
| 85 | Compiling Software From Source Code: Lab ProFTPD | 15:16 | |
| 86 | Task Automation and Scheduling Using Cron (crontab) | 14:51 | |
| 87 | Scheduling Tasks Using Anacron (anacron) | 06:46 | |
| 88 | Mounting and Unmounting File Systems (df, mount, umount, fdisk, gparted) | 11:05 | |
| 89 | Working With Device Files (dd) | 10:21 | |
| 90 | Getting System Hardware Information (lwhw, lscpu, lsusb, lspci, dmidecode, hdparm) | 13:14 | |
| 91 | Intro to systemd | 03:29 | |
| 92 | Service Management (systemd and systemctl) | 07:06 | |
| 93 | Bash Aliases | 07:10 | |
| 94 | Intro to Bash Shell Scripting | 07:34 | |
| 95 | The Bash Shebang and Comments | 05:51 | |
| 96 | Running Scripts | 03:51 | |
| 97 | Variables in Bash | 10:49 | |
| 98 | Environment Variables | 07:25 | |
| 99 | Getting User Input | 05:13 | |
| 100 | Special Variables and Positional Arguments | 08:29 | |
| 101 | If, Elif and Else Statements | 09:25 | |
| 102 | Testing Conditions For Numbers | 03:13 | |
| 103 | Multiple Conditions and Nested If Statements | 06:13 | |
| 104 | Command Substitution | 05:59 | |
| 105 | Comparing Strings in If Statements | 08:54 | |
| 106 | Lab: Testing Network Connections | 04:27 | |
| 107 | For Loops | 08:10 | |
| 108 | Lab: Dropping a List of IP addresses Using a For Loop | 04:27 | |
| 109 | While Loops | 09:43 | |
| 110 | Case Statement | 09:19 | |
| 111 | Functions in Bash | 07:57 | |
| 112 | Variable Scope in Functions | 02:59 | |
| 113 | Menus in Bash. The Select Statement | 05:53 | |
| 114 | Lab: System Administration Script using Menus | 10:04 | |
| 115 | Running a Linux Server in the Cloud | 07:27 | |
| 116 | Securing SSH with Key Authentication | 05:09 | |
| 117 | Project Overview | 05:32 | |
| 118 | What is Docker? Why use it? | 04:59 | |
| 119 | Installing Docker | 08:11 | |
| 120 | The Docker Client | 03:58 | |
| 121 | Pulling Images and Running Containers | 11:14 | |
| 122 | Lab: Running a Web Server in a Docker Container | 05:05 | |
| 123 | Listing Images and Containers | 04:20 | |
| 124 | Removing Images and Containers | 08:12 | |
| 125 | Getting Shell Access to a Container | 06:24 | |
| 126 | Executing Commands in a Running Container | 03:14 | |
| 127 | Getting Information about the Running Containers | 06:32 | |
| 128 | Committing Container Changes into a New Image | 06:26 | |
| 129 | Tagging and Pushing Custom Images to Docker Hub | 04:48 | |
| 130 | Image Structure and Layers | 04:28 | |
| 131 | Creating Custom Images using Dockerfile | 10:53 | |
| 132 | Persistent Data: Volumes | 05:03 | |
| 133 | Project Overview | 02:22 | |
| 134 | Linux Security Checklist | 05:49 | |
| 135 | Securing the OpenSSH Server (sshd) | 11:37 | |
| 136 | Securing the Boot Loader (Grub) | 06:12 | |
| 137 | Enforcing Password Policy | 09:12 | |
| 138 | Locking or Disabling User Accounts | 06:56 | |
| 139 | Giving Limited root Privileges (sudoers and visudo) - Part 1 | 06:37 | |
| 140 | Giving Limited root Privileges (sudoers and visudo) - Part 2 | 09:21 | |
| 141 | Setting Users’ Limits (Running a DoS Attack Without root Access) | 05:45 | |
| 142 | Intro to Cracking Passwords | 04:15 | |
| 143 | Cracking Linux Passwords Using John the Ripper | 07:32 | |
| 144 | Checking Files Integrity with AIDE - Part 1 | 11:33 | |
| 145 | Checking Files Integrity with AIDE - Part 2 | 04:37 | |
| 146 | Scanning for Rootkits (rkhunter and chkrootkit) | 08:58 | |
| 147 | Scanning for Viruses with ClamAV | 10:39 | |
| 148 | Full Disk Encryption Using dm-crypt and LUKS | 12:13 | |
| 149 | Unlocking LUKS Encrypted Drives With A Keyfile | 04:21 | |
| 150 | Symmetric Encryption Using GnuPG | 09:46 | |
| 151 | Steganography Explained | 10:03 | |
| 152 | Steganography In Depth | 07:19 | |
| 153 | Hide Secret Messages Through Steganography with Steghide | 09:08 | |
| 154 | Scanning Networks with Nmap | 09:40 | |
| 155 | Nmap Advanced | 09:26 | |
| 156 | Project Overview: The Big Picture | 02:59 | |
| 157 | Getting a Domain Name | 13:24 | |
| 158 | Diving into the DNS Protocol and Installing a DNS Server (BIND9) | 10:22 | |
| 159 | Setting Up the Authoritative BIND9 DNS Server | 15:01 | |
| 160 | Installing a Web Server (Apache2) | 03:31 | |
| 161 | Setting Up Virtual Hosting | 11:01 | |
| 162 | Securing Apache with OpenSSL and Digital Certificates | 09:22 | |
| 163 | Access Control by Source IP Address | 08:09 | |
| 164 | The 'Files' Directive | 08:25 | |
| 165 | The .htaccess File | 07:53 | |
| 166 | HTTP Digest Authentication | 06:26 | |
| 167 | The Options Directive and Indexing | 13:41 | |
| 168 | HTTP Compression | 05:57 | |
| 169 | SetHandler and Server Status | 05:06 | |
| 170 | Installing PHP | 03:14 | |
| 171 | Installing and Securing the MySql Server | 04:52 | |
| 172 | Installing phpMyAdmin | 09:23 | |
| 173 | Securing phpMyAdmin | 04:06 | |
| 174 | Installing a Web Application (WordPress) | 08:59 | |
| 175 | Securing WordPress | 05:15 | |
| 176 | Intro to Ansible | 03:25 | |
| 177 | Prerequisites | 02:20 | |
| 178 | Ansible Inventory File | 10:13 | |
| 179 | Ansible Ad-Hoc Commands: The Shell Module | 05:56 | |
| 180 | Ansible Ad-Hoc Commands: The Script Module | 04:19 | |
| 181 | Ansible Ad-Hoc Commands: The APT Module | 05:29 | |
| 182 | Ansible Ad-Hoc Commands: The Service Module | 03:35 | |
| 183 | Ansible Ad-Hoc Commands: The User Module | 05:33 | |
| 184 | What is IPFS and How It Works | 09:40 | |
| 185 | Installing IPFS on Linux | 07:44 | |
| 186 | Running an IPFS Node on Linux | 07:00 | |
| 187 | Pinning Objects | 04:03 | |
| 188 | SSH Public Key Authentication Overview | 04:26 | |
| 189 | Generating SSH Key Pair on Windows | 04:59 | |
| 190 | Generating SSH Key Pair on Linux | 03:59 | |
| 191 | Configuring SSH Public Key Authentication on Linux | 11:30 |
Unlock unlimited learning
Get instant access to all 190 lessons in this course, plus thousands of other premium courses. One subscription, unlimited knowledge.
Learn more about subscriptionComments
0 commentsSimilar courses

Cloud-Native: Microservices, Kubernetes, Service Mesh, CI/CD
Sources: udemy
In this course, we’re going to learn how to Design and Build Cloud-Native Apps with Microservices Architecture, Kubernetes Deployments, Communications
25 hours 25 minutes 22 seconds

DevOps.js Conference 2021
Sources: devopsjsconf.com
DevOps.js is an event for all the developers and architects involved in building infrastructure and setting up pipelines and deployments for JavaScript applications. Would you l...
7 hours 51 minutes 4 seconds

DevOps from Start to Finish
Sources: iamtimcorey.com (Tim Corey)
How real-world developers set up their projects, use source control, configure CI/CD, and manage multiple environments. In this course*, you are going to learn how to set up you...
5 hours 43 minutes 19 seconds

DevOps , CI/CD(Continuous Integration/Delivery for Beginners)
Sources: udemy
CI, CD and DevOps have taken over the software development world by storm. Most companies today realize that the practices of continuous integration (CI) and co
55 minutes 44 seconds
Want to join the conversation?
Sign in to comment