Table of contents
About the Course
9m 48s
Lock icon
About This Course | 3m 51s
Lock icon
About the Certification Exam | 5m 7s
Lock icon
About the Author | 50s
Linux Boot Process Concepts
43m 50s
Lock icon
The Linux Boot Process | 3m 57s
Lock icon
Legacy GRUB | 7m 10s
Lock icon
GRUB2 | 7m 39s
Lock icon
Interacting with the Boot Loader | 10m 40s
Lock icon
initramfs | 10m 38s
Lock icon
Other Boot Options | 3m 46s
Install, Configure, and Monitor Kernel Modules
22m 29s
Lock icon
Working with Kernel Modules | 6m 19s
Lock icon
More Kernel Module Commands | 8m 24s
Lock icon
Dealing with a Kernel Panic | 7m 46s
Configure and Verify Network Connection Parameters
1h 29m 25s
Lock icon
Networking Fundamentals | 9m 44s
Lock icon
NetworkManager | 17m 29s
Lock icon
Legacy Networking Tools | 4m 38s
Lock icon
Testing Connectivity | 10m
Lock icon
The Basics of DNS Resolution from Linux | 12m 2s
Lock icon
Bonding and Link Aggregation | 5m 32s
Lock icon
Testing DNS ResolutionTesting DNS Resolution | 30m
Manage Storage in a Linux Environment
2h 17m 45s
Lock icon
Pseudo (Virtual) Filesystems | 8m 9s
Lock icon
Main Filesystem Locations | 10m 43s
Lock icon
Filesystem Hierarchy Standard | 6m 7s
Lock icon
Legacy MBR Partitions | 8m 9s
Lock icon
GPT Partitions | 6m 13s
Lock icon
Swap Partitions | 16m 6s
Lock icon
Creating Linux Filesystems | 9m 51s
Lock icon
Understanding Mount Points | 1m 38s
Lock icon
Mounting and Unmounting Filesystems | 13m 6s
Lock icon
Multipath Storage | 2m 23s
Lock icon
Maintaining a Filesystem | 15m
Lock icon
Disk Space Usage | 10m 20s
Lock icon
Adding a New Hard Disk to a Linux SystemAdding a New Hard Disk to a Linux System | 30m
Localization
17m 54s
Lock icon
Working with the System's Locale | 9m 21s
Lock icon
Time and Date on a Linux System | 8m 33s
Conduct Software Installations, Configurations, Updates, and Removals
2h 24m 4s
Lock icon
The Advanced Package Manager (apt) | 10m 25s
Lock icon
Using Debian Package (dpkg) | 6m 46s
Lock icon
The Yellowdog Updater, Modified (yum) | 10m 11s
Lock icon
The Red Hat Package Manager (rpm) | 9m 20s
Lock icon
DNF and Zypper | 3m 34s
Lock icon
Compiling Applications | 6m 47s
Lock icon
Managing Shared Libraries | 7m 1s
Lock icon
Installing and Managing Packages on Debian/Ubuntu SystemsInstalling and Managing Packages on Debian/Ubuntu Systems | 1h 0m
Lock icon
Installing and Managing Packages on Red Hat/CentOS SystemsInstalling and Managing Packages on Red Hat/CentOS Systems | 30m
Linux Graphical User Interfaces
34m 27s
Lock icon
The Primary Linux Desktops | 6m 22s
Lock icon
Assistive Technologies on the Linux Desktop | 8m 38s
Lock icon
The Basics of X11 | 4m 32s
Lock icon
Remote Graphical Connections | 14m 55s
Understanding Devices in Linux
2h 2m 14s
Lock icon
Investigating Hardware | 9m 9s
Lock icon
The Common Unix Printing System (CUPS) | 13m 22s
Lock icon
The Line Printer Daemon | 9m 43s
Lock icon
Working with the CUPS Print ServerWorking with the CUPS Print Server | 1h 30m
Manage Users and Groups
4h 32m 43s
Lock icon
Adding and Removing Users | 7m 1s
Lock icon
Adding and Removing Groups | 4m 21s
Lock icon
User and Group Configuration Files | 11m 58s
Lock icon
User and Group Modifications | 11m 14s
Lock icon
Securing Local Logins | 5m 24s
Lock icon
Your Bash Shell Environment | 15m 4s
Lock icon
Setting Up the Shell Environment | 10m 42s
Lock icon
Customizing the Shell Environment | 15m 41s
Lock icon
Bash History and the Man Pages | 11m 18s
Lock icon
Modifying the Bash ShellModifying the Bash Shell | 1h 30m
Lock icon
Creating Users and Groups and Managing User AccountsCreating Users and Groups and Managing User Accounts | 1h 0m
Lock icon
Working with Linux Accounts and Password PoliciesWorking with Linux Accounts and Password Policies | 30m
Automate and Schedule Jobs
1h 25m 2s
Lock icon
Cron | 10m 9s
Lock icon
At | 5m 50s
Lock icon
Systemd Timer Unit Files | 9m 3s
Lock icon
Scheduling a Systemd Service Job with Timer UnitsScheduling a Systemd Service Job with Timer Units | 1h 0m
Create, Modify, and Redirect Files
4h 41m 15s
Lock icon
Working with Directories | 10m 58s
Lock icon
Working with Files | 12m 21s
Lock icon
File Globbing | 6m 45s
Lock icon
Introduction to Regular Expressions | 5m 57s
Lock icon
Using Regular Expression Tools | 5m 25s
Lock icon
Understanding Links | 5m 23s
Lock icon
Finding Files | 9m 11s
Lock icon
Understanding Standard Input, Output, and Error | 5m 53s
Lock icon
Finding Commands on a Linux System | 3m 33s
Lock icon
Redirecting Output to the Screen and a File | 12m 23s
Lock icon
File and Folder Compression | 12m 37s
Lock icon
Using the Nano Text Editor | 4m 31s
Lock icon
Using the Vi/Vim Text Editor | 6m 18s
Lock icon
Working with Basic Regular ExpressionsWorking with Basic Regular Expressions | 30m
Lock icon
Creating a Directory Structure in LinuxCreating a Directory Structure in Linux | 30m
Lock icon
Creating and Modifying a File with VimCreating and Modifying a File with Vim | 30m
Lock icon
Working with Compressed Files in LinuxWorking with Compressed Files in Linux | 1h 0m
Lock icon
Working with Links in LinuxWorking with Links in Linux | 30m
Manage Services
2h 40m 6s
Lock icon
init | 9m 21s
Lock icon
Red Hat Service Tools | 5m 43s
Lock icon
Upstart | 6m 8s
Lock icon
Systemd | 5m 45s
Lock icon
systemctl | 10m 4s
Lock icon
Basics of a Unit File | 9m 41s
Lock icon
Target Unit Files | 5m 55s
Lock icon
Service Unit Files | 8m 42s
Lock icon
Timer Unit Files | 9m 3s
Lock icon
Reviewing the State of Your System | 6m 25s
Lock icon
Monitoring Processes | 11m 35s
Lock icon
Keeping a Process Running | 11m 44s
Lock icon
Working with Services in Systemd - Start/Stop/Restart/StatusWorking with Services in Systemd - Start/Stop/Restart/Status | 30m
Lock icon
Changing the Default Target of a SystemChanging the Default Target of a System | 30m
Summarize and Explain Server Roles
23m 17s
Lock icon
Core Network Servers | 5m 3s
Lock icon
Infrastructure Servers | 5m 25s
Lock icon
Monitoring and Security Servers | 4m 39s
Lock icon
Common Server Systems for Client Use | 5m 16s
Lock icon
Container Basics | 2m 54s
File and Directory Permissions
1h 42m 57s
Lock icon
Basic File and Folder Permissions | 5m 10s
Lock icon
Modifying Basic Permissions | 8m 9s
Lock icon
Modifying Advanced Permissions | 18m 46s
Lock icon
Default Permissions | 6m 52s
Lock icon
File Access Control Lists | 4m
Lock icon
Working with Linux Directory PermissionsWorking with Linux Directory Permissions | 30m
Lock icon
Working with Linux File Access Control Lists (FACLs)Working with Linux File Access Control Lists (FACLs) | 30m
Context-Based Permissions
1h 28m 30s
Lock icon
Overview of SELinux | 4m 4s
Lock icon
SELinux Configurations | 5m 48s
Lock icon
SELinux Policy | 2m 44s
Lock icon
SELinux Tools | 9m 46s
Lock icon
AppArmor | 6m 8s
Lock icon
Working With AppArmor ProfilesWorking With AppArmor Profiles | 30m
Lock icon
Troubleshooting SELinuxTroubleshooting SELinux | 30m
Privilege Escalation
51m 22s
Lock icon
Elevating Privileges | 7m 32s
Lock icon
Sudo Configuration | 8m 50s
Lock icon
User Account Types | 5m
Lock icon
Managing Sudo PermissionsManaging Sudo Permissions | 30m
Access and Authentication Configuration
15m 44s
Lock icon
PAM Basics | 3m 4s
Lock icon
PAM Configuration | 9m 12s
Lock icon
PAM and LDAP | 3m 28s
Secure Shell (SSH)
46m 31s
Lock icon
SSH Basics | 3m 50s
Lock icon
SSH Configuration | 8m 31s
Lock icon
SSH and TCPWrappers | 4m 10s
Lock icon
Managing SSH SettingsManaging SSH Settings | 30m
Terminal Types
5m 15s
Lock icon
TTYs and PTYs | 5m 15s
Public Key Infrastructure (PKI)
6m 40s
Lock icon
PKI Keys and Certificates | 6m 40s
Virtual Private Networking (VPN)
4m 36s
Lock icon
IPSec | 1m 52s
Lock icon
SSL / TLS | 2m 44s
Security Best Practices and System Hardening
54m 8s
Lock icon
Protecting The Boot Sequence | 2m 17s
Lock icon
Additional Authentication Methods | 6m 11s
Lock icon
Secure System Design | 5m 35s
Lock icon
Securing Network Services | 4m 44s
Lock icon
Isolating Services | 2m 42s
Lock icon
Restricting Access, Remote and Local | 2m 39s
Lock icon
Locking Down Remote Access to LinuxLocking Down Remote Access to Linux | 30m
Logging Services
40m 50s
Lock icon
Log File Locations | 2m 47s
Lock icon
Log Management | 4m 56s
Lock icon
journalctl | 3m 7s
Lock icon
Working with Syslog DataWorking with Syslog Data | 30m
Firewalls in Linux
1h 6m 21s
Lock icon
Firewall Technologies | 4m 8s
Lock icon
Basics of Access Control Lists | 4m 37s
Lock icon
IP Forwarding | 3m 33s
Lock icon
Dynamic Rule Sets | 5m 3s
Lock icon
Common Application Firewall Configurations | 4m
Lock icon
Configuring a Host Firewall on Ubuntu using UFWConfiguring a Host Firewall on Ubuntu using UFW | 15m
Lock icon
Creating firewalld RulesCreating firewalld Rules | 30m
Backup, Restore, and Compress Files
1h 27m 41s
Lock icon
Archive and Restore Utilities | 5m 41s
Lock icon
Compression | 6m 47s
Lock icon
Types of Backups | 5m 2s
Lock icon
Remote System Storage | 7m 7s
Lock icon
File Integrity Checks | 3m 4s
Lock icon
Backup and RecoveryBackup and Recovery | 1h 0m
Analyze System Properties
1h 20m 10s
Lock icon
Network Monitoring and Configuration, Part 1 | 6m 29s
Lock icon
Network Monitoring and Configuration, Part 2 | 7m 20s
Lock icon
Network Monitoring and Configuration, Part 3 | 5m 23s
Lock icon
Storage Monitoring and Configuration, Part 1 | 9m 14s
Lock icon
Storage Monitoring and Configuration, Part 2 | 5m 46s
Lock icon
CPU Monitoring and Configuration | 6m 26s
Lock icon
Memory Monitoring and Configuration | 5m 6s
Lock icon
Recovering a Lost root Password | 4m 26s
Lock icon
Installing and Using htopInstalling and Using htop | 30m
Analyze System Processes
14m 1s
Lock icon
Process Management, Part 1 | 7m 56s
Lock icon
Process Management, Part 2 | 6m 5s
Troubleshoot User Issues
29m 25s
Lock icon
Permissions | 6m 8s
Lock icon
Access | 3m 17s
Lock icon
Authentication | 3m 18s
Lock icon
File Creation | 7m 40s
Lock icon
Insufficient Privileges for Authorization | 4m 47s
Lock icon
Environment and Shell Issues | 4m 15s
Troubleshoot Application and Hardware Issues
24m 19s
Lock icon
Storage Issues, Part 1 | 3m 57s
Lock icon
Storage Issues, Part 2 | 2m 49s
Lock icon
Firewall | 4m 59s
Lock icon
Permissions on Applications and Devices | 3m 38s
Lock icon
Troubleshooting Software Dependencies and Versions | 4m 12s
Lock icon
Troubleshooting Additional Hardware Issues | 4m 44s
Deploy and Execute Basic Bash Scripts
32m 36s
Lock icon
Shell Environments and Variables | 4m 52s
Lock icon
Construction of a Bash Script | 7m 56s
Lock icon
Exit Codes | 2m 7s
Lock icon
Redirection and Piping | 3m 9s
Lock icon
Conditional Statements | 6m 27s
Lock icon
Looping Constructs | 4m 17s
Lock icon
Positional Parameters and Variable Scope | 3m 48s
Version Control Using Git
2h 31m 46s
Lock icon
Git Basics | 3m 19s
Lock icon
Git Configuration | 5m 39s
Lock icon
Git File System | 2m 34s
Lock icon
Git Branches | 5m 14s
Lock icon
Installing Git and Configuring it for Local RepositoriesInstalling Git and Configuring it for Local Repositories | 30m
Lock icon
Cloning a Remote GitHub RepositoryCloning a Remote GitHub Repository | 45m
Lock icon
Branching and Merging Code with Git Source ControlBranching and Merging Code with Git Source Control | 1h 0m
Orchestration Processes and Concepts
15m 53s
Lock icon
Central Configuration Overview | 3m 19s
Lock icon
Agent vs. Agentless | 3m 29s
Lock icon
Inventory | 1m 50s
Lock icon
Infrastructure as Code | 2m 14s
Lock icon
Infrastructure Automation | 2m 17s
Lock icon
Automated Configuration Management | 2m 44s
The Exam
1h 30m
Lock icon
CompTIA Linux Plus XK0-004CompTIA Linux Plus XK0-004 | 1h 30m
Next Steps
2m 28s
Lock icon
Exam Preparation | 2m 28s
Get access now
Sign up to get immediate access to this course plus thousands more you can watch anytime, anywhere
Cancel
Close button icon