DevOps Bootcamp: Learn Linux & Become a Linux Sysadmin
24h 11m 36s
English
Paid
Course description
This DevOps Bootcamp will take you from an absolute beginner in Linux to getting hired as a confident and effective Linux System Administrator.
Read more about the course
- Everything you need to become a professional Linux Sysadmin and get hired
- Learn how to set up the Linux environment (installing both Ubuntu and CentOS in a virtual machine)
- For each Linux key concept or command, you'll also get a cheatsheet, quiz and practice exercises
- Understanding of Linux File Permissions, Processes, User Account Management, Linux Networking or Software Management
- Acquire a solid foundation of Netfilter/Iptables Linux Firewall (Chains, Tables, Matches, Targets)
- Master all of the key concepts and commands in Linux starting from scratch. No prior Linux knowledge is required
- Build a complete understanding of Linux OS (Distribution Independent) as a complete beginner
- Network Security & Ethical Hacking Key Concepts (Reconnaissance, Sniffing, Iptables Firewall and more)
- Ability to actually apply a deep understanding of Linux on real-world projects
Watch Online
Join premium to watch
Go to premium
# | Title | Duration |
---|---|---|
1 | Course Outline | 05:51 |
2 | Linux Distributions | 06:57 |
3 | Installing Ubuntu in a VM | 13:21 |
4 | Things to Do After Installing Ubuntu | 10:17 |
5 | Installing CentOS in a VM | 12:21 |
6 | Migrating to Linux | 06:57 |
7 | Terminals, Consoles, Shells and Commands | 09:34 |
8 | Linux Command Structure | 06:56 |
9 | Getting Help, Man Pages (man, type, help, apropos) | 11:10 |
10 | Mastering the Terminal: The TAB Key | 06:43 |
11 | Mastering the Terminal: Keyboard Shortcuts | 04:58 |
12 | Mastering the Terminal: the Bash History | 08:41 |
13 | Running Commands Without Leaving a Trace | 06:31 |
14 | Recording the Date and Time for Each line in History | 02:42 |
15 | root vs. non-Privileged Users. Getting root Access (sudo, su, passwd) | 11:25 |
16 | Intro to The Linux Files System | 05:29 |
17 | The Filesystem Hierarchy Standard ( FHS) | 09:40 |
18 | Absolute vs. Relative Paths. Walking through the File System (pwd, cd, tree) | 13:11 |
19 | The LS Command In Depth (ls) | 08:22 |
20 | Understanding File Timestamps: atime, mtime, ctime (stat, touch, date) | 09:45 |
21 | Sorting Files by Timestamp | 01:55 |
22 | File Types in Linux (ls -F, file) | 07:33 |
23 | Viewing Files - Part 1 (cat) | 04:29 |
24 | Viewing Files - Part 2 (less, more) | 03:51 |
25 | Viewing Files - Part 3 (tail, head, watch) | 06:18 |
26 | Creating Files and Directories (touch, mkdir) | 07:11 |
27 | Copying Files and Directories (cp) | 06:20 |
28 | Moving and Renaming Files and Directories (mv) | 07:47 |
29 | Removing Files and Directories (rm, shred) | 09:28 |
30 | Working With Pipes in Linux (|, wc) | 08:08 |
31 | Command Redirection (>, >>, 2> &>, cut, tee) | 14:32 |
32 | Finding Files and Directories - Part 1 (locate, which) | 10:12 |
33 | Finding Files and Directories - Part 2 (find) | 11:44 |
34 | Find and Exec | 04:25 |
35 | Searching for String Patterns in Text Files (grep) | 12:33 |
36 | Searching for Strings in Binary Files (strings) | 03:40 |
37 | Comparing Files (cmp, diff, sha256) | 09:55 |
38 | The Basics of VIM Text Editor | 08:47 |
39 | The VIM Editor In Depth - Part 1 | 08:57 |
40 | The VIM Editor In Depth - Part 2 | 05:50 |
41 | Compressing and Archiving Files and Directories (tar, gzip) | 14:16 |
42 | Hard Links and the Inode Structure | 09:30 |
43 | Working With Symlinks. Symlinks vs. Hard Links | 05:23 |
44 | Understanding /etc/passwd and /etc/shadow files | 08:52 |
45 | Understanding Linux Groups (groups, id) | 04:57 |
46 | Creating User Accounts (useradd) | 08:18 |
47 | Changing and Removing User Accounts (usermod, userdel) | 06:13 |
48 | Creating Admin Users | 02:49 |
49 | Group Management (groupadd, groupdel, groupmod) | 03:37 |
50 | User Account Monitoring (whoami, who am i, who, id, w, uptime, last) | 07:22 |
51 | Understanding File Permissions | 07:22 |
52 | Octal (Numeric) Notation of File Permissions | 05:52 |
53 | Changing File Permissions (chmod) | 09:00 |
54 | The Effect of Permissions on Directories | 07:25 |
55 | Combining Find and Chmod Commands Together | 03:32 |
56 | Changing File Ownership (chown, chgrp) | 06:55 |
57 | Understanding SUID (Set User ID) | 10:28 |
58 | Understanding SGID (Set Group ID) | 05:54 |
59 | Understanding the Sticky Bit | 05:41 |
60 | Umask | 05:12 |
61 | Understanding Files Attributes (lsattr, chattr) | 07:16 |
62 | Processes and The Linux Security Model | 08:40 |
63 | Listing Processes (ps, pstree) | 12:25 |
64 | Getting a Dynamic Real-Time View of the Running System (top, htop) | 13:13 |
65 | Signals and Killing Processes (kill, pkill, killall, pidof) | 11:28 |
66 | Foreground and Background Processes | 04:39 |
67 | Job Control (jobs, fg, bg | 07:28 |
68 | Getting Information about the Network Interfaces (ip, ifconfig | 07:29 |
69 | Configuring the Network On The Fly (ifconfig, ip, route) | 07:16 |
70 | Setting Up Static IP on Ubuntu (netplan) | 07:39 |
71 | Testing and Troubleshooting Network Connectivity | 09:50 |
72 | Using SSH | 08:05 |
73 | Troubleshooting SSH | 08:08 |
74 | Securing the OpenSSH Server (sshd) | 11:37 |
75 | Copying Files Over the Network (scp) | 12:02 |
76 | Synchronizing Files and Directories using rsync | 11:57 |
77 | Using rsync Over the Network | 06:52 |
78 | Using wget | 09:32 |
79 | Checking for Listening Ports (netstat, ss, lsof, telnet, nmap) | 09:38 |
80 | DPKG (Debian and Ubuntu Based Distros) | 09:13 |
81 | Intro to APT | 01:51 |
82 | Using APT (Advanced Package Tool) | 12:00 |
83 | Compiling Programs from Source Code vs. Package Manager | 04:59 |
84 | Compiling C Programs | 03:29 |
85 | Compiling Software From Source Code: Lab ProFTPD | 15:16 |
86 | Task Automation and Scheduling Using Cron (crontab) | 14:51 |
87 | Scheduling Tasks Using Anacron (anacron) | 06:46 |
88 | Mounting and Unmounting File Systems (df, mount, umount, fdisk, gparted) | 11:05 |
89 | Working With Device Files (dd) | 10:21 |
90 | Getting System Hardware Information (lwhw, lscpu, lsusb, lspci, dmidecode, hdparm) | 13:14 |
91 | Intro to systemd | 03:29 |
92 | Service Management (systemd and systemctl) | 07:06 |
93 | Bash Aliases | 07:10 |
94 | Intro to Bash Shell Scripting | 07:34 |
95 | The Bash Shebang and Comments | 05:51 |
96 | Running Scripts | 03:51 |
97 | Variables in Bash | 10:49 |
98 | Environment Variables | 07:25 |
99 | Getting User Input | 05:13 |
100 | Special Variables and Positional Arguments | 08:29 |
101 | If, Elif and Else Statements | 09:25 |
102 | Testing Conditions For Numbers | 03:13 |
103 | Multiple Conditions and Nested If Statements | 06:13 |
104 | Command Substitution | 05:59 |
105 | Comparing Strings in If Statements | 08:54 |
106 | Lab: Testing Network Connections | 04:27 |
107 | For Loops | 08:10 |
108 | Lab: Dropping a List of IP addresses Using a For Loop | 04:27 |
109 | While Loops | 09:43 |
110 | Case Statement | 09:19 |
111 | Functions in Bash | 07:57 |
112 | Variable Scope in Functions | 02:59 |
113 | Menus in Bash. The Select Statement | 05:53 |
114 | Lab: System Administration Script using Menus | 10:04 |
115 | Running a Linux Server in the Cloud | 07:27 |
116 | Securing SSH with Key Authentication | 05:09 |
117 | Project Overview | 05:32 |
118 | What is Docker? Why use it? | 04:59 |
119 | Installing Docker | 08:11 |
120 | The Docker Client | 03:58 |
121 | Pulling Images and Running Containers | 11:14 |
122 | Lab: Running a Web Server in a Docker Container | 05:05 |
123 | Listing Images and Containers | 04:20 |
124 | Removing Images and Containers | 08:12 |
125 | Getting Shell Access to a Container | 06:24 |
126 | Executing Commands in a Running Container | 03:14 |
127 | Getting Information about the Running Containers | 06:32 |
128 | Committing Container Changes into a New Image | 06:26 |
129 | Tagging and Pushing Custom Images to Docker Hub | 04:48 |
130 | Image Structure and Layers | 04:28 |
131 | Creating Custom Images using Dockerfile | 10:53 |
132 | Persistent Data: Volumes | 05:03 |
133 | Project Overview | 02:22 |
134 | Linux Security Checklist | 05:49 |
135 | Securing the OpenSSH Server (sshd) | 11:37 |
136 | Securing the Boot Loader (Grub) | 06:12 |
137 | Enforcing Password Policy | 09:12 |
138 | Locking or Disabling User Accounts | 06:56 |
139 | Giving Limited root Privileges (sudoers and visudo) - Part 1 | 06:37 |
140 | Giving Limited root Privileges (sudoers and visudo) - Part 2 | 09:21 |
141 | Setting Users’ Limits (Running a DoS Attack Without root Access) | 05:45 |
142 | Intro to Cracking Passwords | 04:15 |
143 | Cracking Linux Passwords Using John the Ripper | 07:32 |
144 | Checking Files Integrity with AIDE - Part 1 | 11:33 |
145 | Checking Files Integrity with AIDE - Part 2 | 04:37 |
146 | Scanning for Rootkits (rkhunter and chkrootkit) | 08:58 |
147 | Scanning for Viruses with ClamAV | 10:39 |
148 | Full Disk Encryption Using dm-crypt and LUKS | 12:13 |
149 | Unlocking LUKS Encrypted Drives With A Keyfile | 04:21 |
150 | Symmetric Encryption Using GnuPG | 09:46 |
151 | Steganography Explained | 10:03 |
152 | Steganography In Depth | 07:19 |
153 | Hide Secret Messages Through Steganography with Steghide | 09:08 |
154 | Scanning Networks with Nmap | 09:40 |
155 | Nmap Advanced | 09:26 |
156 | Project Overview: The Big Picture | 02:59 |
157 | Getting a Domain Name | 13:24 |
158 | Diving into the DNS Protocol and Installing a DNS Server (BIND9) | 10:22 |
159 | Setting Up the Authoritative BIND9 DNS Server | 15:01 |
160 | Installing a Web Server (Apache2) | 03:31 |
161 | Setting Up Virtual Hosting | 11:01 |
162 | Securing Apache with OpenSSL and Digital Certificates | 09:22 |
163 | Access Control by Source IP Address | 08:09 |
164 | The 'Files' Directive | 08:25 |
165 | The .htaccess File | 07:53 |
166 | HTTP Digest Authentication | 06:26 |
167 | The Options Directive and Indexing | 13:41 |
168 | HTTP Compression | 05:57 |
169 | SetHandler and Server Status | 05:06 |
170 | Installing PHP | 03:14 |
171 | Installing and Securing the MySql Server | 04:52 |
172 | Installing phpMyAdmin | 09:23 |
173 | Securing phpMyAdmin | 04:06 |
174 | Installing a Web Application (WordPress) | 08:59 |
175 | Securing WordPress | 05:15 |
176 | Intro to Ansible | 03:25 |
177 | Prerequisites | 02:20 |
178 | Ansible Inventory File | 10:13 |
179 | Ansible Ad-Hoc Commands: The Shell Module | 05:56 |
180 | Ansible Ad-Hoc Commands: The Script Module | 04:19 |
181 | Ansible Ad-Hoc Commands: The APT Module | 05:29 |
182 | Ansible Ad-Hoc Commands: The Service Module | 03:35 |
183 | Ansible Ad-Hoc Commands: The User Module | 05:33 |
184 | What is IPFS and How It Works | 09:40 |
185 | Installing IPFS on Linux | 07:44 |
186 | Running an IPFS Node on Linux | 07:00 |
187 | Pinning Objects | 04:03 |
188 | SSH Public Key Authentication Overview | 04:26 |
189 | Generating SSH Key Pair on Windows | 04:59 |
190 | Generating SSH Key Pair on Linux | 03:59 |
191 | Configuring SSH Public Key Authentication on Linux | 11:30 |
Comments
0 commentsSimilar courses

DevOps Beginners to Advanced | Decoding DevOps with Projects
Sources: udemy
Decoding DevOps course is for anybody who wants to get started with DevOps. As there are many tools & technologies in DevOps, it has become difficult for people to choose the ri...
47 hours 57 minutes 48 seconds

Docker for DevOps Engineers
Sources: Amigoscode (Nelson Djalo)
Docker is tool to package and deploy software using containers. Unlike Virtual Machines, Docker is lightweight and does not require a lot of resources to run. Docker has become ...
4 hours 41 minutes 11 seconds

DevOps Mastery: Secure Internet Traffic with WireGuard VPN
Sources: zerotomastery.io
This course is perfect for DevOps engineers and anyone looking to quickly enhance their online privacy and security. Why WireGuard? WireGuard VPN...
1 hour 6 minutes 8 seconds

DevOps , CI/CD(Continuous Integration/Delivery for Beginners)
Sources: udemy
CI, CD and DevOps have taken over the software development world by storm. Most companies today realize that the practices of continuous integration (CI) and co
55 minutes 44 seconds
Want to join the conversation?
Sign in to comment