CompTIA Linux+ Certification

CompTIA Linux+ Certification

Audience

On this course you'll learn to perform common tasks in major distributions of Linux and gain your CompTIA Linux+ certification. Learn to use the Linux command line, perform basic maintenance, install and configure workstations, and use networking features.

CompTIA Linux+ is for the IT pro who will use Linux to manage everything from cars and smartphones to servers and supercomputers, including:

  • Linux Administrators
  • Technical Support Specialists
  • Systems Administrators
  • Network Administrators
  • Web Administrators

The CompTIA Linux+ certification is distribution neutral, therefore content is applicable to many variants of Linux including:

  • Red Hat Enterprise Linux
  • SUSE Linux Enterprise
  • Ubuntu

Prerequisites

Delegates should have a good understanding of the principles of IT, but do not need any specific Linux knowledge prior to attending.

Attending our CompTIA A+ Certification and CompTIA Network+ Certification courses, or equivalent experience, would be beneficial.

Duration

5 days. Hands on.

Course Objectives

This course teaches the competencies required of an early career system administrator working with Linux systems and supports attendees in taking and passing the CompTIA Linux+ exam (Exam XK0-004).

CompTIA Linux+ validates the skills of IT professionals with hands-on experience configuring, monitoring, and supporting servers running the Linux operating system. The exam certifies expertise in the following areas: security, kernel modules, storage and virtualization, device management at an enterprise level, git and automation, networking and firewalls, server side and command line, server (vs. client-based) coverage, troubleshooting and SELinux.

What Skills Will You Learn?

  • Hardware and System Configuration
    • Configure kernel modules, network parameters, storage, cloud and virtualization technologies.
  • System Operation and Maintenance
    • Manage software and services, and explain server roles, job scheduling, and the use and operation of Linux devices.
  • Security
    • Understand best practices for permissions and authentication, firewalls, and file management.
  • Linux Troubleshooting and Diagnostics
    • Analyze system properties and processes and troubleshoot user, application and hardware issues.
  • Automation and Scripting
    • Execute basic BASH scripts, version control using Git, and orchestration processes.

Course highlights:

  • All pre- and post-course materials and manuals are provided.
  • All exam fees are included.
  • Exam revision sessions and practice exams included.
  • Full pre- and post-course tutor support.
  • Restaurant lunches and refreshments are provided.
  • Training in the centre of the World Heritage City of Bath.
  • We don't charge for re-sits if you don't pass first time (you just pay the exam cost set by the exam board and a £10 contribution towards your lunch).

In our opinion there is no better, faster or more cost effective way of becoming Linux+ qualified!

Course Content

Hardware and System Configuration

Explain Linux boot process concepts
Boot loaders
Boot options
File locations
Boot modules and files
Kernel panic

Given a scenario, install, configure, and monitor kernel modules
Commands
Locations

Given a scenario, configure and verify network connection parameters
Diagnostic tools
Configuration files
Bonding

Given a scenario, manage storage in a Linux environment
Basic partitions
File system hierarchy
Device mapper
Tools
Location
File system types

Compare and contrast cloud and virtualization concepts and technologies
Templates
Bootstrapping
Storage
Network considerations
Types of hypervisors
Tools

Given a scenario, configure localization options
File locations
Commands
Environment variables
Character sets

Systems Operation and Maintenance

Given a scenario, conduct software installations, configurations, updates, and removals
Package types
Installation tools
Build tools
Repositories
Acquisition commands

Given a scenario, manage users and groups
Creation
Modification
Deletion
Queries
Quotas
Profiles
Important files and file contents

Given a scenario, create, modify, and redirect files
Text editors
File readers
Output redirection
Text processing
File and directory operations

Given a scenario, manage services
Systemd management
SysVinit

Summarize and explain server roles
NTP
SSH
Web
Certificate authority
Name server
DHCP
File servers
Authentication server
Proxy
Logging
Containers
VPN
Monitoring
Database
Print server
Mail server
Load balancer
Clustering

Given a scenario, automate and schedule jobs
cron
at
crontab
fg
bg
&
kill
Ctrl+c
Ctrl+z
nohup

Explain the use and operation of Linux devices
Types of devices
Monitoring and configuration tools
File locations
Hot pluggable devices

Compare and contrast Linux graphical user interfaces
Servers
GUI
Remote desktop
Console redirection
Accessibility

Security

Given a scenario, apply or acquire the appropriate user and/or group permissions and ownership
File and directory permissions
Context-based permissions
Privilege escalation
User types

Given a scenario, configure and implement appropriate access and authentication methods
PAM
SSH
TTYs
PTYs
PKI
VPN as a client

Summarize security best practices in a Linux environment
Boot security
Additional authentication methods
Importance of disabling root login via SSH
Password-less login
Chroot jail services
No shared IDs
Importance of denying hosts
Separation of OS data from application data
Change default ports
Importance of disabling or uninstalling unused and unsecure services
Importance of enabling SSL/TLS
Importance of enabling auditd
CVE monitoring
Discouraging use of USB devices
Disk encryption
Restrict cron access
Disable Ctrl+Alt+Del
Add banner
MOTD

Given a scenario, implement logging services
Key file locations
Log management
lastb

Given a scenario, implement and configure Linux firewalls
Access control lists
Technologies
IP forwarding
Dynamic rule sets
Common application firewall configurations

Given a scenario, backup, restore, and compress files
Archive and restore utilities
Compression
Backup types
Off-site/off-system storage
Integrity checks

Linux Troubleshooting and Diagnostics

Given a scenario, analyze system properties and remediate accordingly
Network monitoring and configuration
Storage monitoring and configuration
CPU monitoring and configuration
Memory monitoring and configuration
Lost root password

Given a scenario, analyze system processes in order to optimize performance
Process management

Given a scenario, analyze and troubleshoot user issues
Permissions
Access
Authentication
File creation
Insufficient privileges for authorization
Environment and shell issues

Given a scenario, analyze and troubleshoot application and hardware issues
SELinux context violations
Storage
Firewall
Permission
Dependencies
Troubleshooting additional hardware issues

Automation and Scripting

Given a scenario, deploy and execute basic BASH scripts
Shell environments and shell variables
#!/bin/bash
Sourcing scripts
Directory and file permissions
Extensions
Commenting
File globbing
Shell expansions
Redirection and piping
Exit codes
Metacharacters
Positional parameters
Looping constructs
Conditional statements
Escaping characters

Given a scenario, carry out version control using Git
Arguments
Files

Summarize orchestration processes and concepts
Agent
Agentless
Procedures
Attributes
Infrastructure automation
Infrastructure as code
Inventory
Automated configuration management
Build automation

Virtual Courses

ALL of our courses can be delivered virtually. And our Bath public schedule of courses are now available as live virtual sessions, using the popular Zoom Virtual Classroom and remote labs. Delegates can test their access at: www.zoom.us/test

Public Courses

On-Site Courses

Can't attend one of our public classes? Booking for multiple people?

All our courses are available on your site! Delivered for your staff, at your premises.

Contact us to find out more...