O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CompTIA Linux+ XKO-002

Video Description

The CompTIA Linux+ Training Course includes expert instructor-led training modules with customized presentations, practice exam simulators and learning supplements for an all-inclusive training program that provides all the benefits of classroom training at your own pace. CompTIA's Linux+ is a is a vendor-neutral certification that validates the knowledge of individuals with a minimum of six to twelve months of practical Linux experience. The CompTIA Linux+ Course confirms an IT professional's proficiency in the everyday management of Linux-based clients and basic management of server systems. Students will learn the knowledge and tools necessary to manage Linux systems from the command line, as well as how to manage user administration, file permissions, software configurations, and Linux-based clients, server systems and security. This Linux+ training course follows the CompTIA objectives, ensuring you receive the training and knowledge needed to succeed.

Table of Contents

  1. Introduction
    1. Instructor Introduction 00:00:27
    2. Course Overview 00:01:24
  2. Module 1 - Getting Started with Linux
    1. Getting Started with Linux 00:00:17
    2. Linux and its History Part1 00:02:35
    3. Linux and its History Part2 00:02:43
    4. Linux and its History Part3 00:01:32
    5. Linux and its History Part4 00:00:42
    6. Linux and its History Part5 00:01:56
    7. Linux and its History Part6 00:01:56
    8. Linux and its History Part7 00:01:40
    9. Linux and its History Part8 00:00:33
    10. Linux and its History Part9 00:03:50
    11. Linux and its History Part10 00:04:00
    12. Linux and its History Part11 00:04:12
    13. Linux and its History Part12 00:01:07
    14. Linux and its History Part13 00:00:24
    15. Linux and its History Part14 00:00:30
    16. Basic Commands Part1 00:00:34
    17. Basic Commands Part2 00:00:34
    18. Basic Commands Part3 00:03:24
    19. Basic Commands Part4 00:03:45
    20. Basic Commands Part5 00:03:47
    21. Basic Commands Part6 00:02:46
    22. Basic Commands Part7 00:03:39
    23. Basic Commands Part8 00:03:27
    24. Basic Commands Part9 00:01:18
    25. Documentation 00:03:26
    26. Booting and Shutting Down 00:02:53
    27. Module 1 Review 00:00:20
  3. Module 2 - Linux File System
    1. Linux File System 00:00:23
    2. File System Types Part1 00:00:33
    3. File System Types Part2 00:01:57
    4. File System Types Part3 00:01:41
    5. File System Types Part4 00:01:21
    6. File System Types Part5 00:02:16
    7. File System Types Part6 00:00:45
    8. File System Types Part7 00:04:41
    9. File System Types Part8 00:02:05
    10. Partitioning Part1 00:06:00
    11. Partitioning Part2 00:00:28
    12. Partitioning Part3 00:04:12
    13. Partitioning Part4 00:02:34
    14. Partitioning Part5 00:00:58
    15. Partitioning Part6 00:03:30
    16. Partitioning Part7 00:00:14
    17. Partitioning Part8 00:04:02
    18. Partitioning Part9 00:04:00
    19. Partitioning Part10 00:01:28
    20. Partitioning Part11 00:03:05
    21. Partitioning Part12 00:03:14
    22. Partitioning Part13 00:03:14
    23. Navigation Part1 00:01:15
    24. Navigation Part2 00:04:08
    25. Navigation Part3 00:00:12
    26. Navigation Part4 00:03:59
    27. Navigation Part5 00:04:03
    28. Navigation Part6 00:03:45
    29. Navigation Part7 00:02:40
    30. Managing and Maintaining the File System Part1 00:00:26
    31. Managing and Maintaining the File System Part2 00:02:45
    32. Managing and Maintaining the File System Part3 00:02:38
    33. Module 2 Review 00:00:35
  4. Module 3 - Users and Groups
    1. Users and Groups 00:00:13
    2. User Groups and Profiles Part1 00:03:30
    3. User Groups and Profiles Part2 00:00:26
    4. Managing User Accounts Part1 00:04:01
    5. Managing User Accounts Part2 00:03:33
    6. Managing User Accounts Part3 00:03:54
    7. Managing User Accounts Part4 00:03:33
    8. Managing User Accounts Part5 00:03:39
    9. Managing User Accounts Part6 00:03:25
    10. Managing User Accounts Part7 00:01:21
    11. Managing User Accounts Part8 00:04:36
    12. Module 3 Review 00:00:17
  5. Module 4 - Working with Files
    1. Working with Files 00:00:32
    2. VI Editor Part1 00:02:15
    3. VI Editor Part2 00:03:49
    4. VI Editor Part3 00:03:33
    5. VI Editor Part4 00:03:26
    6. VI Editor Part5 00:02:38
    7. VI Editor Part6 00:00:51
    8. Locating Files Part1 00:05:51
    9. Locating Files Part2 00:02:41
    10. Locating Files Part3 00:02:29
    11. Links Part1 00:00:30
    12. Links Part2 00:01:04
    13. Backup and Restore Part1 00:02:58
    14. Backup and Restore Part2 00:04:00
    15. Backup and Restore Part3 00:00:46
    16. MySQL Part1 00:02:15
    17. MySQL Part2 00:00:39
    18. Permissions Part1 00:02:22
    19. Permissions Part2 00:00:15
    20. Special Permissions Part1 00:00:59
    21. Special Permissions Part2 00:02:52
    22. Module 4 Review 00:00:33
  6. Module 5 - Scripting
    1. Scripting 00:00:18
    2. Shells Part1 00:04:31
    3. Shells Part2 00:00:33
    4. Shells Part3 00:02:35
    5. Shells Part4 00:03:41
    6. Customizing the Bash Shell Part1 00:04:03
    7. Customizing the Bash Shell Part2 00:01:20
    8. I/O and Control Statements Part1 00:01:07
    9. I/O and Control Statements Part2 00:01:02
    10. Module 5 Review 00:00:13
  7. Module 6 - Printing
    1. Printing 00:00:14
    2. Configuring Local Printers and Printer File Commands Part1 00:02:13
    3. Configuring Local Printers and Printer File Commands Part2 00:03:05
    4. Configuring Local Printers and Printer File Commands Part3 00:01:27
    5. Print Jobs, Queues and Remote Printing Part1 00:01:50
    6. Print Jobs, Queues and Remote Printing Part2 00:00:29
    7. Print Jobs, Queues and Remote Printing Part3 00:01:42
    8. Module 6 Review 00:00:13
  8. Module 7 - Packages
    1. Packages 00:00:26
    2. Using RPM Part1 00:01:44
    3. Using RPM Part2 00:00:43
    4. Using RPM Part3 00:01:27
    5. Using RPM Part4 00:01:22
    6. Using RPM Part5 00:02:51
    7. Verifying Packages, Updating Packages and Repositories Part1 00:02:05
    8. Verifying Packages, Updating Packages and Repositories Part2 00:01:05
    9. Verifying Packages, Updating Packages and Repositories Part3 00:00:37
    10. Verifying Packages, Updating Packages and Repositories Part4 00:00:54
    11. YUM Commands and Install with YUM Part1 00:00:44
    12. YUM Commands and Install with YUM Part2 00:00:55
    13. YUM Commands and Install with YUM Part3 00:03:33
    14. YUM Commands and Install with YUM Part4 00:00:54
    15. Debian Package Manager Part1 00:00:26
    16. Debian Package Manager Part2 00:03:05
    17. Source Files Part1 00:00:19
    18. Source Files Part2 00:00:59
    19. Source Files Part3 00:01:04
    20. Module 7 Review 00:00:20
  9. Module 8 - Networking
    1. Networking 00:00:56
    2. Connecting to a Network Part1 00:02:03
    3. Connecting to a Network Part2 00:02:10
    4. Connecting to a Network Part3 00:04:30
    5. Connecting to a Network Part4 00:02:24
    6. Connecting to a Network Part5 00:02:04
    7. Connecting to a Network Part6 00:00:43
    8. Connecting to a Network Part7 00:01:59
    9. Connecting to a Network Part8 00:03:06
    10. Connecting to a Network Part9 00:01:22
    11. Connecting to a Network Part10 00:01:07
    12. Connecting to a Network Part11 00:02:40
    13. Connecting to a Network Part12 00:02:05
    14. Connecting to a Network Part13 00:01:56
    15. Connecting to a Network Part14 00:01:02
    16. Connecting to a Network Part15 00:01:08
    17. Connecting to a Network Part16 00:00:44
    18. Connecting to a Network Part17 00:01:51
    19. Configuring Routes Part1 00:04:19
    20. Configuring Routes Part2 00:02:11
    21. Configuring Routes Part3 00:00:10
    22. Configuring Routes Part4 00:04:05
    23. Configuring Routes Part5 00:03:13
    24. Configuring Routes Part6 00:00:35
    25. Configuring Routes Part7 00:00:40
    26. Configuring DHCP Part1 00:02:08
    27. Configuring DHCP Part2 00:04:13
    28. Configuring DHCP Part3 00:00:17
    29. Configuring DHCP Part4 00:02:12
    30. Configuring DNS Part1 00:04:02
    31. Configuring DNS Part2 00:03:12
    32. Configuring DNS Part3 00:00:26
    33. Configuring DNS Part4 00:00:37
    34. Configuring DNS Part5 00:03:54
    35. Configuring DNS Part6 00:03:04
    36. Configuring DNS Part7 00:01:03
    37. Configuring DNS Part8 00:02:36
    38. Implementing Network File Sharing Services Part1 00:01:50
    39. Implementing Network File Sharing Services Part2 00:03:59
    40. Implementing Network File Sharing Services Part3 00:02:29
    41. Implementing Network File Sharing Services Part4 00:03:15
    42. Implementing Network File Sharing Services Part5 00:01:01
    43. Implementing Network File Sharing Services Part6 00:05:09
    44. Implementing Network File Sharing Services Part7 00:03:20
    45. Implementing Network File Sharing Services Part8 00:01:46
    46. Implementing Network File Sharing Services Part9 00:00:40
    47. Configuring NIS Part1 00:00:36
    48. Configuring NIS Part2 00:00:40
    49. Configuring NIS Part3 00:00:37
    50. Configuring NIS Part4 00:01:31
    51. Configuring NIS Part5 00:00:54
    52. Configuring NIS Part6 00:01:33
    53. Managing Remote Network Servers Part1 00:03:15
    54. Managing Remote Network Servers Part2 00:02:11
    55. Managing Remote Network Servers Part3 00:00:33
    56. Configuring Web Servers Part1 00:00:58
    57. Configuring Web Servers Part2 00:00:17
    58. Configuring Web Servers Part3 00:01:19
    59. Configuring Web Servers Part4 00:01:20
    60. Configuring Web Servers Part5 00:00:49
    61. Configuring Web Servers Part6 00:01:05
    62. Configuring Web Servers Part7 00:00:30
    63. Configuring Web Servers Part8 00:03:53
    64. Configuring Web Servers Part9 00:01:43
    65. Configuring Web Servers Part10 00:02:57
    66. Implementing Apache Access Control Part1 00:04:24
    67. Implementing Apache Access Control Part2 00:02:06
    68. Implementing Apache Access Control Part3 00:01:34
    69. Implementing Apache Access Control Part4 00:02:16
    70. Implementing Apache Access Control Part5 00:04:59
    71. Implementing Access Control in a Proxy Server Part1 00:00:57
    72. Implementing Access Control in a Proxy Server Part2 00:01:31
    73. Implementing Access Control in a Proxy Server Part3 00:02:27
    74. Implementing Access Control in a Proxy Server Part4 00:03:38
    75. Implementing Access Control in a Proxy Server Part5 00:02:24
    76. Implementing Access Control in a Proxy Server Part6 00:01:53
    77. Configuring E-mail Services Part1 00:00:36
    78. Configuring E-mail Services Part2 00:02:00
    79. Configuring E-mail Services Part3 00:01:31
    80. Configuring E-mail Services Part4 00:02:35
    81. Configuring E-mail Services Part5 00:00:47
    82. Configuring E-mail Services Part6 00:04:06
    83. Configuring E-mail Services Part7 00:02:23
    84. Configuring E-mail Services Part8 00:01:06
    85. Module 8 Review 00:00:55
  10. Module 9 - Hardware
    1. Hardware 00:00:17
    2. Common Hardware Part1 00:01:02
    3. Common Hardware Part2 00:00:42
    4. Common Hardware Part3 00:01:38
    5. Common Hardware Part4 00:03:24
    6. Power Management Part1 00:00:56
    7. Power Management Part2 00:02:41
    8. Power Management Part3 00:01:38
    9. Power Management Part4 00:01:34
    10. Power Management Part5 00:02:19
    11. Removable Hardware Part1 00:01:56
    12. Removable Hardware Part2 00:04:17
    13. Removable Hardware Part3 00:01:50
    14. Removable Hardware Part4 00:00:53
    15. Mass Storage Devices Part1 00:02:17
    16. Mass Storage Devices Part2 00:02:16
    17. Mass Storage Devices Part3 00:03:24
    18. Mass Storage Devices Part4 00:03:22
    19. Mass Storage Devices Part5 00:02:13
    20. Logical Volumes Part1 00:01:27
    21. Logical Volumes Part2 00:03:08
    22. Logical Volumes Part3 00:01:02
    23. Disk Quotas Part1 00:02:34
    24. Disk Quotas Part2 00:01:10
    25. Disk Quotas Part3 00:03:51
    26. Module 9 Review 00:00:17
  11. Module 10 - Linux Kernel
    1. Linux Kernel 00:00:30
    2. Exploring the Linux Kernel Kernel Modules Part1 00:00:51
    3. Exploring the Linux Kernel Kernel Modules Part2 00:01:00
    4. Exploring the Linux Kernel Kernel Modules Part3 00:01:10
    5. Exploring the Linux Kernel Kernel Modules Part4 00:01:28
    6. Exploring the Linux Kernel Kernel Modules Part5 00:01:15
    7. Exploring the Linux Kernel Kernel Modules Part6 00:01:17
    8. Exploring the Linux Kernel Kernel Modules Part7 00:03:30
    9. Exploring the Linux Kernel Kernel Modules Part8 00:00:47
    10. Exploring the Linux Kernel Kernel Modules Part9 00:02:38
    11. Creating an initrd Image Part1 00:00:54
    12. Creating an initrd Image Part2 00:00:24
    13. Creating an initrd Image Part3 00:00:34
    14. Creating an initrd Image Part4 00:00:59
    15. Managing Device Drivers Part1 00:00:22
    16. Managing Device Drivers Part2 00:04:12
    17. Managing Device Drivers Part3 00:00:42
    18. Managing Device Drivers Part4 00:01:27
    19. Monitoring Hardware Devices, Processes and Resources Part1 00:01:36
    20. Monitoring Hardware Devices, Processes and Resources Part2 00:00:37
    21. Monitoring Hardware Devices, Processes and Resources Part3 00:02:30
    22. Monitoring Hardware Devices, Processes and Resources Part4 00:03:38
    23. Monitoring Hardware Devices, Processes and Resources Part5 00:03:42
    24. Monitoring Hardware Devices, Processes and Resources Part6 00:04:02
    25. Monitoring Hardware Devices, Processes and Resources Part7 00:02:52
    26. Monitoring Hardware Devices, Processes and Resources Part8 00:01:42
    27. Module 10 Review 00:00:22
  12. Module 11 - Processes
    1. Processes 00:00:22
    2. Jobs and Background Processes Part1 00:01:57
    3. Jobs and Background Processes Part2 00:01:06
    4. Jobs and Background Processes Part3 00:02:40
    5. Jobs and Background Processes Part4 00:01:09
    6. Jobs and Background Processes Part5 00:00:43
    7. Using Process Table Part1 00:01:04
    8. Using Process Table Part2 00:04:44
    9. Using Process Table Part3 00:00:32
    10. Using Process Table Part4 00:04:42
    11. Using Process Table Part5 00:02:33
    12. Using Process Table Part6 00:03:36
    13. Using Process Table Part7 00:03:53
    14. Using Process Table Part8 00:03:36
    15. Using Process Table Part9 00:01:54
    16. Delayed, Detached and Scheduled Jobs Part1 00:02:12
    17. Delayed, Detached and Scheduled Jobs Part2 00:05:55
    18. Delayed, Detached and Scheduled Jobs Part3 00:00:51
    19. Delayed, Detached and Scheduled Jobs Part4 00:01:51
    20. Delayed, Detached and Scheduled Jobs Part5 00:00:47
    21. Delayed, Detached and Scheduled Jobs Part6 00:02:14
    22. System Time Part1 00:00:15
    23. System Time Part2 00:01:36
    24. System Time Part3 00:01:54
    25. Module 11 Review 00:00:18
  13. Module 12
    1. System Services 00:00:13
    2. Configuring System Services Part1 00:01:18
    3. Configuring System Services Part2 00:02:56
    4. Configuring System Services Part3 00:02:34
    5. Monitoring System Logs Part1 00:01:36
    6. Monitoring System Logs Part2 00:00:34
    7. Monitoring System Logs Part3 00:00:29
    8. Monitoring System Logs Part4 00:00:32
    9. Monitoring System Logs Part5 00:03:08
    10. Monitoring System Logs Part6 00:03:58
    11. Monitoring System Logs Part7 00:03:54
    12. Monitoring System Logs Part8 00:02:08
    13. Configuring SELinux Part1 00:00:45
    14. Configuring SELinux Part2 00:04:03
    15. Module 12 Review 00:00:37
  14. Module 13 - Securing Linux
    1. Securing Linux 00:00:25
    2. Examining System Security Part1 00:01:59
    3. Examining System Security Part2 00:01:00
    4. Examining System Security Part3 00:00:56
    5. Examining System Security Part4 00:00:29
    6. Examining System Security Part5 00:02:23
    7. Examining System Security Part6 00:02:23
    8. Examining System Security Part7 00:02:14
    9. Examining System Security Part8 00:01:14
    10. Examining System Security Part9 00:01:25
    11. Examining System Security Part10 00:01:00
    12. Examining System Security Part11 00:01:07
    13. Examining System Security Part12 00:04:12
    14. Examining System Security Part13 00:01:02
    15. Examining System Security Part14 00:02:30
    16. Examining System Security Part15 00:02:07
    17. Examining System Security Part16 00:01:43
    18. Examining System Security Part17 00:01:08
    19. Examining System Security Part18 00:00:48
    20. Examining System Security Part19 00:01:12
    21. Examining System Security Part20 00:02:11
    22. Securing User Accounts Part1 00:00:12
    23. Securing User Accounts Part2 00:02:37
    24. Securing User Accounts Part3 00:00:50
    25. Securing User Accounts Part4 00:02:42
    26. Securing User Accounts Part5 00:01:02
    27. Securing User Accounts Part6 00:00:52
    28. Securing User Accounts Part7 00:00:50
    29. Securing User Accounts Part8 00:00:56
    30. Securing User Accounts Part9 00:02:24
    31. Securing User Accounts Part10 00:02:43
    32. Securing User Accounts Part11 00:01:51
    33. Enabling Firewall Functionality and Implementing Security Auditing Part1 00:01:05
    34. Enabling Firewall Functionality and Implementing Security Auditing Part2 00:01:19
    35. Enabling Firewall Functionality and Implementing Security Auditing Part3 00:01:42
    36. Enabling Firewall Functionality and Implementing Security Auditing Part4 00:03:16
    37. Enabling Firewall Functionality and Implementing Security Auditing Part5 00:00:44
    38. Enabling Firewall Functionality and Implementing Security Auditing Part6 00:00:24
    39. Intrusion Detection Part1 00:00:29
    40. Intrusion Detection Part2 00:02:33
    41. Intrusion Detection Part3 00:03:06
    42. Intrusion Detection Part4 00:01:09
    43. Intrusion Detection Part5 00:01:13
    44. Intrusion Detection Part6 00:00:17
    45. Intrusion Detection Part7 00:02:33
    46. Intrusion Detection Part8 00:01:03
    47. Intrusion Detection Part9 00:02:32
    48. Intrusion Detection Part10 00:02:18
    49. Intrusion Detection Part11 00:02:33
    50. Module 13 Review 00:01:41
    51. Security Based Distributions Demo Part1 00:03:46
    52. Security Based Distributions Demo Part2 00:04:01
    53. Security Based Distributions Demo Part3 00:03:34
    54. Security Based Distributions Demo Part4 00:04:15
  15. Module 14 - Pre-Installation Considerations and Installing
    1. Pre-Installation Considerations and Installing 00:00:31
    2. Preparing For Installation Part1 00:02:08
    3. Preparing For Installation Part2 00:01:45
    4. Preparing For Installation Part3 00:00:29
    5. Preparing For Installation Part4 00:01:59
    6. Preparing For Installation Part5 00:01:25
    7. Identifying Phases of the Linux Boot Sequence Part1 00:01:14
    8. Identifying Phases of the Linux Boot Sequence Part2 00:02:16
    9. Configuring GRUB Part1 00:02:26
    10. Configuring GRUB Part2 00:03:42
    11. Install Overview 00:02:31
    12. Installing SUSE Part1 00:04:00
    13. Installing SUSE Part2 00:03:59
    14. Installing SUSE Part3 00:03:54
    15. Installing SUSE Part4 00:04:01
    16. Installing SUSE Part5 00:03:21
    17. Installing Fedora Part1 00:03:44
    18. Installing Fedora Part2 00:04:13
    19. Installing CentOS Part1 00:03:58
    20. Installing CentOS Part2 00:03:49
    21. Installing CentOS Part3 00:00:44
    22. Installing Debian Part1 00:03:40
    23. Installing Debian Part2 00:03:48
    24. Installing Debian Part3 00:00:45
    25. Configuring the GUI and Performing Post-Installation Tasks Part1 00:01:00
    26. Configuring the GUI and Performing Post-Installation Tasks Part2 00:04:51
    27. Configuring the GUI and Performing Post-Installation Tasks Part3 00:00:52
    28. Configuring the GUI and Performing Post-Installation Tasks Part4 00:04:06
    29. Configuring the GUI and Performing Post-Installation Tasks Part5 00:01:30
    30. Module 14 Review 00:00:30
  16. Module 15 - Troubleshooting
    1. Troubleshooting 00:00:17
    2. Troubleshooting System-Based Issues and Hardware Issues Part1 00:00:38
    3. Troubleshooting System-Based Issues and Hardware Issues Part2 00:04:05
    4. Troubleshooting System-Based Issues and Hardware Issues Part3 00:05:57
    5. Troubleshooting System-Based Issues and Hardware Issues Part4 00:02:08
    6. Troubleshooting System-Based Issues and Hardware Issues Part5 00:01:46
    7. Troubleshooting System-Based Issues and Hardware Issues Part6 00:00:40
    8. Troubleshooting System-Based Issues and Hardware Issues Part7 00:00:17
    9. Troubleshooting System-Based Issues and Hardware Issues Part8 00:05:55
    10. Troubleshooting System-Based Issues and Hardware Issues Part9 00:02:37
    11. Troubleshooting System-Based Issues and Hardware Issues Part10 00:05:01
    12. Troubleshooting Network Connection and Security Issues Part1 00:01:34
    13. Troubleshooting Network Connection and Security Issues Part2 00:01:52
    14. Troubleshooting Network Connection and Security Issues Part3 00:01:00
    15. Troubleshooting Network Connection and Security Issues Part4 00:00:37
    16. Troubleshooting Network Connection and Security Issues Part5 00:02:18
    17. Troubleshooting Network Connection and Security Issues Part6 00:01:06
    18. Troubleshooting Network Connection and Security Issues Part7 00:02:31
    19. Troubleshooting Network Connection and Security Issues Part8 00:01:30
    20. Troubleshooting Network Connection and Security Issues Part9 00:00:55
    21. Module 15 Review 00:00:44
    22. Course Review Part1 00:02:31
    23. Course Review Part2 00:03:49
    24. Course Review Part3 00:03:02
    25. Final Thoughts 00:02:25