DevOps Bootcamp: Learn Linux & Become a Linux Sysadmin
24h 11m 36s
English
Paid
Course description
This DevOps Bootcamp will take you from an absolute beginner in Linux to getting hired as a confident and effective Linux System Administrator.
Read more about the course
- Everything you need to become a professional Linux Sysadmin and get hired
- Learn how to set up the Linux environment (installing both Ubuntu and CentOS in a virtual machine)
- For each Linux key concept or command, you'll also get a cheatsheet, quiz and practice exercises
- Understanding of Linux File Permissions, Processes, User Account Management, Linux Networking or Software Management
- Acquire a solid foundation of Netfilter/Iptables Linux Firewall (Chains, Tables, Matches, Targets)
- Master all of the key concepts and commands in Linux starting from scratch. No prior Linux knowledge is required
- Build a complete understanding of Linux OS (Distribution Independent) as a complete beginner
- Network Security & Ethical Hacking Key Concepts (Reconnaissance, Sniffing, Iptables Firewall and more)
- Ability to actually apply a deep understanding of Linux on real-world projects
Watch Online
0:00
/ #1: Course Outline
All Course Lessons (191)
| # | Lesson Title | Duration | Access |
|---|---|---|---|
| 1 | Course Outline Demo | 05:51 | |
| 2 | Linux Distributions | 06:57 | |
| 3 | Installing Ubuntu in a VM | 13:21 | |
| 4 | Things to Do After Installing Ubuntu | 10:17 | |
| 5 | Installing CentOS in a VM | 12:21 | |
| 6 | Migrating to Linux | 06:57 | |
| 7 | Terminals, Consoles, Shells and Commands | 09:34 | |
| 8 | Linux Command Structure | 06:56 | |
| 9 | Getting Help, Man Pages (man, type, help, apropos) | 11:10 | |
| 10 | Mastering the Terminal: The TAB Key | 06:43 | |
| 11 | Mastering the Terminal: Keyboard Shortcuts | 04:58 | |
| 12 | Mastering the Terminal: the Bash History | 08:41 | |
| 13 | Running Commands Without Leaving a Trace | 06:31 | |
| 14 | Recording the Date and Time for Each line in History | 02:42 | |
| 15 | root vs. non-Privileged Users. Getting root Access (sudo, su, passwd) | 11:25 | |
| 16 | Intro to The Linux Files System | 05:29 | |
| 17 | The Filesystem Hierarchy Standard ( FHS) | 09:40 | |
| 18 | Absolute vs. Relative Paths. Walking through the File System (pwd, cd, tree) | 13:11 | |
| 19 | The LS Command In Depth (ls) | 08:22 | |
| 20 | Understanding File Timestamps: atime, mtime, ctime (stat, touch, date) | 09:45 | |
| 21 | Sorting Files by Timestamp | 01:55 | |
| 22 | File Types in Linux (ls -F, file) | 07:33 | |
| 23 | Viewing Files - Part 1 (cat) | 04:29 | |
| 24 | Viewing Files - Part 2 (less, more) | 03:51 | |
| 25 | Viewing Files - Part 3 (tail, head, watch) | 06:18 | |
| 26 | Creating Files and Directories (touch, mkdir) | 07:11 | |
| 27 | Copying Files and Directories (cp) | 06:20 | |
| 28 | Moving and Renaming Files and Directories (mv) | 07:47 | |
| 29 | Removing Files and Directories (rm, shred) | 09:28 | |
| 30 | Working With Pipes in Linux (|, wc) | 08:08 | |
| 31 | Command Redirection (>, >>, 2> &>, cut, tee) | 14:32 | |
| 32 | Finding Files and Directories - Part 1 (locate, which) | 10:12 | |
| 33 | Finding Files and Directories - Part 2 (find) | 11:44 | |
| 34 | Find and Exec | 04:25 | |
| 35 | Searching for String Patterns in Text Files (grep) | 12:33 | |
| 36 | Searching for Strings in Binary Files (strings) | 03:40 | |
| 37 | Comparing Files (cmp, diff, sha256) | 09:55 | |
| 38 | The Basics of VIM Text Editor | 08:47 | |
| 39 | The VIM Editor In Depth - Part 1 | 08:57 | |
| 40 | The VIM Editor In Depth - Part 2 | 05:50 | |
| 41 | Compressing and Archiving Files and Directories (tar, gzip) | 14:16 | |
| 42 | Hard Links and the Inode Structure | 09:30 | |
| 43 | Working With Symlinks. Symlinks vs. Hard Links | 05:23 | |
| 44 | Understanding /etc/passwd and /etc/shadow files | 08:52 | |
| 45 | Understanding Linux Groups (groups, id) | 04:57 | |
| 46 | Creating User Accounts (useradd) | 08:18 | |
| 47 | Changing and Removing User Accounts (usermod, userdel) | 06:13 | |
| 48 | Creating Admin Users | 02:49 | |
| 49 | Group Management (groupadd, groupdel, groupmod) | 03:37 | |
| 50 | User Account Monitoring (whoami, who am i, who, id, w, uptime, last) | 07:22 | |
| 51 | Understanding File Permissions | 07:22 | |
| 52 | Octal (Numeric) Notation of File Permissions | 05:52 | |
| 53 | Changing File Permissions (chmod) | 09:00 | |
| 54 | The Effect of Permissions on Directories | 07:25 | |
| 55 | Combining Find and Chmod Commands Together | 03:32 | |
| 56 | Changing File Ownership (chown, chgrp) | 06:55 | |
| 57 | Understanding SUID (Set User ID) | 10:28 | |
| 58 | Understanding SGID (Set Group ID) | 05:54 | |
| 59 | Understanding the Sticky Bit | 05:41 | |
| 60 | Umask | 05:12 | |
| 61 | Understanding Files Attributes (lsattr, chattr) | 07:16 | |
| 62 | Processes and The Linux Security Model | 08:40 | |
| 63 | Listing Processes (ps, pstree) | 12:25 | |
| 64 | Getting a Dynamic Real-Time View of the Running System (top, htop) | 13:13 | |
| 65 | Signals and Killing Processes (kill, pkill, killall, pidof) | 11:28 | |
| 66 | Foreground and Background Processes | 04:39 | |
| 67 | Job Control (jobs, fg, bg | 07:28 | |
| 68 | Getting Information about the Network Interfaces (ip, ifconfig | 07:29 | |
| 69 | Configuring the Network On The Fly (ifconfig, ip, route) | 07:16 | |
| 70 | Setting Up Static IP on Ubuntu (netplan) | 07:39 | |
| 71 | Testing and Troubleshooting Network Connectivity | 09:50 | |
| 72 | Using SSH | 08:05 | |
| 73 | Troubleshooting SSH | 08:08 | |
| 74 | Securing the OpenSSH Server (sshd) | 11:37 | |
| 75 | Copying Files Over the Network (scp) | 12:02 | |
| 76 | Synchronizing Files and Directories using rsync | 11:57 | |
| 77 | Using rsync Over the Network | 06:52 | |
| 78 | Using wget | 09:32 | |
| 79 | Checking for Listening Ports (netstat, ss, lsof, telnet, nmap) | 09:38 | |
| 80 | DPKG (Debian and Ubuntu Based Distros) | 09:13 | |
| 81 | Intro to APT | 01:51 | |
| 82 | Using APT (Advanced Package Tool) | 12:00 | |
| 83 | Compiling Programs from Source Code vs. Package Manager | 04:59 | |
| 84 | Compiling C Programs | 03:29 | |
| 85 | Compiling Software From Source Code: Lab ProFTPD | 15:16 | |
| 86 | Task Automation and Scheduling Using Cron (crontab) | 14:51 | |
| 87 | Scheduling Tasks Using Anacron (anacron) | 06:46 | |
| 88 | Mounting and Unmounting File Systems (df, mount, umount, fdisk, gparted) | 11:05 | |
| 89 | Working With Device Files (dd) | 10:21 | |
| 90 | Getting System Hardware Information (lwhw, lscpu, lsusb, lspci, dmidecode, hdparm) | 13:14 | |
| 91 | Intro to systemd | 03:29 | |
| 92 | Service Management (systemd and systemctl) | 07:06 | |
| 93 | Bash Aliases | 07:10 | |
| 94 | Intro to Bash Shell Scripting | 07:34 | |
| 95 | The Bash Shebang and Comments | 05:51 | |
| 96 | Running Scripts | 03:51 | |
| 97 | Variables in Bash | 10:49 | |
| 98 | Environment Variables | 07:25 | |
| 99 | Getting User Input | 05:13 | |
| 100 | Special Variables and Positional Arguments | 08:29 | |
| 101 | If, Elif and Else Statements | 09:25 | |
| 102 | Testing Conditions For Numbers | 03:13 | |
| 103 | Multiple Conditions and Nested If Statements | 06:13 | |
| 104 | Command Substitution | 05:59 | |
| 105 | Comparing Strings in If Statements | 08:54 | |
| 106 | Lab: Testing Network Connections | 04:27 | |
| 107 | For Loops | 08:10 | |
| 108 | Lab: Dropping a List of IP addresses Using a For Loop | 04:27 | |
| 109 | While Loops | 09:43 | |
| 110 | Case Statement | 09:19 | |
| 111 | Functions in Bash | 07:57 | |
| 112 | Variable Scope in Functions | 02:59 | |
| 113 | Menus in Bash. The Select Statement | 05:53 | |
| 114 | Lab: System Administration Script using Menus | 10:04 | |
| 115 | Running a Linux Server in the Cloud | 07:27 | |
| 116 | Securing SSH with Key Authentication | 05:09 | |
| 117 | Project Overview | 05:32 | |
| 118 | What is Docker? Why use it? | 04:59 | |
| 119 | Installing Docker | 08:11 | |
| 120 | The Docker Client | 03:58 | |
| 121 | Pulling Images and Running Containers | 11:14 | |
| 122 | Lab: Running a Web Server in a Docker Container | 05:05 | |
| 123 | Listing Images and Containers | 04:20 | |
| 124 | Removing Images and Containers | 08:12 | |
| 125 | Getting Shell Access to a Container | 06:24 | |
| 126 | Executing Commands in a Running Container | 03:14 | |
| 127 | Getting Information about the Running Containers | 06:32 | |
| 128 | Committing Container Changes into a New Image | 06:26 | |
| 129 | Tagging and Pushing Custom Images to Docker Hub | 04:48 | |
| 130 | Image Structure and Layers | 04:28 | |
| 131 | Creating Custom Images using Dockerfile | 10:53 | |
| 132 | Persistent Data: Volumes | 05:03 | |
| 133 | Project Overview | 02:22 | |
| 134 | Linux Security Checklist | 05:49 | |
| 135 | Securing the OpenSSH Server (sshd) | 11:37 | |
| 136 | Securing the Boot Loader (Grub) | 06:12 | |
| 137 | Enforcing Password Policy | 09:12 | |
| 138 | Locking or Disabling User Accounts | 06:56 | |
| 139 | Giving Limited root Privileges (sudoers and visudo) - Part 1 | 06:37 | |
| 140 | Giving Limited root Privileges (sudoers and visudo) - Part 2 | 09:21 | |
| 141 | Setting Users’ Limits (Running a DoS Attack Without root Access) | 05:45 | |
| 142 | Intro to Cracking Passwords | 04:15 | |
| 143 | Cracking Linux Passwords Using John the Ripper | 07:32 | |
| 144 | Checking Files Integrity with AIDE - Part 1 | 11:33 | |
| 145 | Checking Files Integrity with AIDE - Part 2 | 04:37 | |
| 146 | Scanning for Rootkits (rkhunter and chkrootkit) | 08:58 | |
| 147 | Scanning for Viruses with ClamAV | 10:39 | |
| 148 | Full Disk Encryption Using dm-crypt and LUKS | 12:13 | |
| 149 | Unlocking LUKS Encrypted Drives With A Keyfile | 04:21 | |
| 150 | Symmetric Encryption Using GnuPG | 09:46 | |
| 151 | Steganography Explained | 10:03 | |
| 152 | Steganography In Depth | 07:19 | |
| 153 | Hide Secret Messages Through Steganography with Steghide | 09:08 | |
| 154 | Scanning Networks with Nmap | 09:40 | |
| 155 | Nmap Advanced | 09:26 | |
| 156 | Project Overview: The Big Picture | 02:59 | |
| 157 | Getting a Domain Name | 13:24 | |
| 158 | Diving into the DNS Protocol and Installing a DNS Server (BIND9) | 10:22 | |
| 159 | Setting Up the Authoritative BIND9 DNS Server | 15:01 | |
| 160 | Installing a Web Server (Apache2) | 03:31 | |
| 161 | Setting Up Virtual Hosting | 11:01 | |
| 162 | Securing Apache with OpenSSL and Digital Certificates | 09:22 | |
| 163 | Access Control by Source IP Address | 08:09 | |
| 164 | The 'Files' Directive | 08:25 | |
| 165 | The .htaccess File | 07:53 | |
| 166 | HTTP Digest Authentication | 06:26 | |
| 167 | The Options Directive and Indexing | 13:41 | |
| 168 | HTTP Compression | 05:57 | |
| 169 | SetHandler and Server Status | 05:06 | |
| 170 | Installing PHP | 03:14 | |
| 171 | Installing and Securing the MySql Server | 04:52 | |
| 172 | Installing phpMyAdmin | 09:23 | |
| 173 | Securing phpMyAdmin | 04:06 | |
| 174 | Installing a Web Application (WordPress) | 08:59 | |
| 175 | Securing WordPress | 05:15 | |
| 176 | Intro to Ansible | 03:25 | |
| 177 | Prerequisites | 02:20 | |
| 178 | Ansible Inventory File | 10:13 | |
| 179 | Ansible Ad-Hoc Commands: The Shell Module | 05:56 | |
| 180 | Ansible Ad-Hoc Commands: The Script Module | 04:19 | |
| 181 | Ansible Ad-Hoc Commands: The APT Module | 05:29 | |
| 182 | Ansible Ad-Hoc Commands: The Service Module | 03:35 | |
| 183 | Ansible Ad-Hoc Commands: The User Module | 05:33 | |
| 184 | What is IPFS and How It Works | 09:40 | |
| 185 | Installing IPFS on Linux | 07:44 | |
| 186 | Running an IPFS Node on Linux | 07:00 | |
| 187 | Pinning Objects | 04:03 | |
| 188 | SSH Public Key Authentication Overview | 04:26 | |
| 189 | Generating SSH Key Pair on Windows | 04:59 | |
| 190 | Generating SSH Key Pair on Linux | 03:59 | |
| 191 | Configuring SSH Public Key Authentication on Linux | 11:30 |
Unlock unlimited learning
Get instant access to all 190 lessons in this course, plus thousands of other premium courses. One subscription, unlimited knowledge.
Learn more about subscriptionComments
0 commentsWant to join the conversation?
Sign in to commentSimilar courses
DevOps Mastery: Secure Internet Traffic with WireGuard VPN
Sources: zerotomastery.io
This course is perfect for DevOps engineers and anyone looking to quickly enhance their online privacy and security. Why WireGuard? WireGuard VPN...
1 hour 6 minutes 8 seconds
Linux and DevOps Editable Cheatsheets + PDFs
Sources: Valentine Nachi
Get 100+ PDF materials on Linux, Networking, Sysadmin, and DevOps. High quality and editable formats for study and work. Available in light and dark...
Docker for DevOps Engineers
Sources: Amigoscode (Nelson Djalo)
Docker is tool to package and deploy software using containers. Unlike Virtual Machines, Docker is lightweight and does not require a lot of resources to run. Docker has become ...
4 hours 41 minutes 11 seconds