Linux eLearning Bundle Course

Course Overview

This eLearning Bundle includes these 4 courses: Linux, Linux Shell Scripting Solutions, Linux System Administration and Mastering Linux Security and Hardening.

Course Topics

Linux – 8:35 hours

In this course, expert Jordan Hudgens explores the fundamentals of the Linux operating system. As well as giving an overview of Linux and touching on its history and evolution, Hudgens will tap into some key areas of Linux including the command line interface, default tools, and managing processes. Finally, he will discuss file and user management within Linux. After completing this course you will be well on your way to becoming fluent in Linux. A continuation of Linux Part 1: Overview, Tools and Users, this course, with expert Jordan Hudgens, explores system functions as well as managing files and directories. Hudgens will discuss working with background jobs and installing packages from the command line, as well as show the power of the Linux Kernel including its flexibility and how it runs the entire OS. Finally, he will walk through the shell programming language and custom scripts, finishing up with creating partitions.

Learn all about the boot process and how to build a Linux boot process from the ground up, including how to work with GRUB, systemd, and the full boot sequence. Discover the importance of quickly and efficiently adding and configuring environment variables when it comes to building out your system. Finally, explore input and output as well as the process of piping data from files and directories or to log files. Discover what it takes to manage a Linux system. Find out what a backup file consists of and how to both manually and automatically back up a system. Explore package management including YUM and RPM, and because security is a critical, discover how to implement proper security protocols. Finally, learn what options you have when it comes to file systems and discover which option is right for you. Learn how to use VIM, one of the most universal text editors on the market. Whether you’re an administrator or a developer, learn how to customize VIM to best suit your needs. Discover how to manage passwords and complete security checks with the shadow password management system. Explore advanced permissions to be able to update users, set permissions on files and directories, and keep your Linux system organized.

Linux, Part 1 of 5: Overview, Tools, and Users
Linux, Part 2 of 5: System Functions, Scripts, and Partitions
Linux, Part 3 of 5: Input/Output and Variables
Linux, Part 4 of 5: Files and Security
Linux, Part 5 of 5: VIM and Permissions

Linux Shell Scripting Solutions – 8:25 hours

The shell remains one of the most powerful tools on a computer system yet a large number of users are unaware of how much can be accomplished with it. Using a combination of simple commands, you will see how to solve complex problems in day-to-day computer usage. This video will take you through useful real-world examples to make your daily life easy when working with the shell. It shows you how to effectively use the shell to accomplish complex tasks with ease. Starting with the basics of the shell, you will learn simple commands and their usages, allowing you to perform operations on different kinds of files. We then explain text processing and web interaction, and conclude with backups, monitoring, and other sysadmin tasks. This is an an excellent guide on solving day-to-day problems using the shell and a few powerful commands together to create solutions.

SHELL SOMETHING OUT
Printing in the Terminal
Playing with Variables and Environment Variables
Function to Prepend to Environment Variables
Math with the Shell
Playing with File Description and Redirection
Arrays and Associative Arrays
Visiting Aliases
Grabbing Information about the Terminal
Getting and Setting Dates and Delays
Debugging the Script
Functions and Arguments
Reading the Output of a Sequence of Commands
Reading n Characters without Pressing the Return Key
Running a Command Until It Succeeds
Field Separators and Iterators
Comparisons and Tests

HAVE A GOOD COMMAND
Concatenating with cat
Recording and playing Back of terminal sessions
Finding files and file listing
Playing with xargs
Translating with tr
Checksum and Verification
Cryptographic Tools and Hashes
Sorting Unique and Duplicates
Temporary File Naming and Random Numbers
Splitting Files and Data
Slicing Filenames Based on Extension
Renaming and Moving Files in Bulk
Spell Checking and Dictionary Manipulation
Automating Interactive Input
Making Commands Quicker by Running Parallel Processes

FILE IN, FILE OUT
Generating Files of any Size
The Intersection and Set Difference (A-B) on Text Files
Finding and Deleting Duplicate Files
Working with File Permissions, Ownership, and the Sticky Bit
Making Files Immutable
Generating Blank Files in Bulk
Finding Symbolic Links and Their Targets
Enumerating File Type Statistics
Using Loopback Files
Finding the Difference between Files, Patching
Using Head and Tail for Printing the Last or First Ten Lines
Listing Only Directories – Alternative Methods
Fast Command-Line Navigation Using pushd and popd
Counting the Number of Lines, Words and Characters in a File
Printing the Directory Tree

TEXTING AND DRIVING
Using Regular Expressions
Searching and mining text inside a file with grep
Cutting a File Column-Wise with Cut
Using sed to Perform Text Replacement
Using awk for Advanced Text Processing
Finding Frequency of Words Used in a Given File
Compressing or Decompressing JavaScript
Merging Multiple Files as Columns
Printing the nth Word or Column in a File or Line
Printing Text between Line Numbers or Patterns
Printing Lines in the Reverse Order
Parsing E-mail Address and URLs from Text
Removing a Sentence in a File Containing a Word
Replacing a Pattern with Text in all Files in a Directory
Text Slicing and Parameter Operations

TANGLED WEB? NOT AT ALL!!
Downloading from a Web Page
Downloading a Web Page as Plain Text
Primer on cURL
Parsing Data from a Website
Image crawler and downloader
Web photo album generator
Creating a “define ” Utility by Using the Web Backend
Finding Broken Links in a Website
Tracking changes to a website
Posting to a Web Page and Reading Response

THE BACKUP PLAN
Archiving with tar
Archiving with cpio
Compressing data with gzip
Archiving and Compressing with Zip
Faster Archiving with pbzip2
Creating filesystems with Compression
Backup Snapshots with rsync
Version Control-Based Backup with Git
Creating entire disk images using fsarchiver

THE OLD-BOY NETWORK
Let Us Ping!
Listing All the Machines Alive on a Network
Running Commands on a Remote Host with SSH
Transferring Files through the Network
Password-Less Auto-Login with SSH
Port Forwarding and Mounting Remote Drives
Network Traffic and Port Analysis
Creating Arbitrary Sockets

PUT ON THE MONITORS CAP
Monitoring Disk Usage
Calculating the Execution Time for a Command
Collecting Information about Logged-in Users, Boot Logs, and Boot Failures
Listing the Top ten CPU Consuming Processes in an Hour
Monitoring Command Outputs with Watch
Logging Access to Files and Directories
Logfile Management with logrotate
Logging with syslogd
Monitoring User Logins to Find Intruders
Remote Disk Usage Health Monitor
Finding Out Active User Hours on a System
Measuring and Optimizing Power Usage
Monitoring Disk Activity
Checking Disks and Filesystems for Errors

ADMINISTRATION CALLS
Gathering Information about Processes
Killing Processes and Send or Respond to Signals
Sending Messages to User Terminals
Gathering System Information
Using /proc for Gathering Information
Scheduling with cron
Writing and Reading the MySQL Database from Bash
User Administration Script
Bulk Image Resizing and Format Conversion
Taking Screenshots from the Terminal
Managing Multiple Terminals from One

Linux System Administration – 5:53 hours

Linux System Administration LiveLessons provides novice Linux users with more than five hours of step-by-step video training covering essential system administration responsibilities and skills with professional system administrator Ben Whaley. The content comprises nine video lessons featuring command-line examples and conceptual discussion. The video tutorials offer practical advice for real world system administration, such as encouraging the use of shell shortcuts and automation to reduce tedious manual tasks and improve administrative efficiency. What You Will Learn: How to use Vagrant and VirtualBox as a makeshift lab environment Linux’s history and background Shell shortcuts and basic bash scripting The Linux startup and shutdown procedures Management of user accounts The use of sudo to control access to privileged commands Interact with processes from the command line The filesystem layout File permissions and attributes Log file management with syslog and logrotate Linux on a TCP/IP network Network debugging with tcpdump and ping Using SSH for remote management The iptables host-based firewall How to secure a Linux system.

Lesson 1: Where to Start
Lesson 2: The Shell
Lesson 3: Booting and Shutting Down
Lesson 4: Access Control, Accounts and Rootly Powers
Lesson 5: Controlling Processes
Lesson 6: The File System
Lesson 7: Log Files and Syslog
Lesson 8: TCP/IP Networking
Lesson9: Security

Mastering Linux Security and Hardening – 4:05 hours

This book has extensive coverage of techniques that will help prevent attackers from breaching your system, by building a much more secure Linux environment. You will learn various security techniques such as SSH hardening, network service detection, setting up firewalls, encrypting file systems, protecting user accounts, authentication processes, and so on. Moving forward, you will also develop hands-on skills with advanced Linux permissions, access control, special modes, and more. Lastly, this book will also cover best practices and troubleshooting techniques to get your work done efficiently.By the end of this book, you will be confident in delivering a system that will be much harder to compromise.

RUNNING LINUX IN A VIRTUAL ENVIRONMENT
The Course Overview
The Threat Landscape and Keeping Up with Security News
Introduction to VirtualBox and Cygwin

SECURING USER ACCOUNTS
Setting Up sudo Privileges for Full Administrative Users
Setting Up sudo for Users with Only Certain Delegated Privileges
Advanced Tips and Tricks for Using sudo
Locking Down Users’ Home Directories the Red Hat/CentOS and Debian/Ubuntu Way
Enforcing Strong Password Criteria
Setting and Enforcing Password and Account Expiration
Preventing Brute-Force Password Attacks
Locking User Accounts

SECURING YOUR SERVER WITH A FIREWALL
An Overview of iptables
Uncomplicated Firewall for Ubuntu Systems
firewalld for Red Hat Systems
nftables – A More Universal Type of Firewall System

ENCRYPTING AND SSH HARDENING
GNU Privacy Guard
Encrypting Partitions with Linux Unified Key Setup – LUKS
Encrypting Directories with eCryptfs
Using VeraCrypt for Cross-Platform Sharing of Encrypted Containers
Ensuring that SSH Protocol 1 Is Disabled
Creating a User’s SSH Key Set
Disabling Username/Password Logins

MASTERING DISCRETIONARY ACCESS CONTROL
Changing Ownership of Files and Directories
Setting Permissions Values
Using SUID and SGID
Protecting Sensitive Files

ACCESS CONTROL LISTS AND SHARED DIRECTORY MANAGEMENT
Creating an Access Control List
Creating an Inherited Access Control List
Removing a Specific Permission
Preventing Loss of ACLs
Creating a User Group and Adding Members to It
Setting the SGID Bit and the Sticky Bit
Accessing Files in the Shared Directory

IMPLEMENTING MANDATORY ACCESS CONTROL WITH SELINUX AND APPARMOR
How SELinux Can Benefit a Systems Administrator?
Setting Security Contexts for Files and Directories
Troubleshooting with setroubleshoot
Working with SELinux Policies
Looking at AppArmor Profiles
Working with AppArmor Command-Line Utilities

SCANNING, AUDITING, AND HARDENING
Installing and Updating ClamAV and maldet
Scanning with ClamAV and maldet
SELinux Considerations
Scanning for Rootkits with Rootkit Hunter
Controlling the auditd Daemon and Creating Audit Rule
Using ausearch and aureport
Scanning and Hardening with Lynis