PRIVATE GROUP FEE:
$ Based upon a class size of six students.
Scheduling can be adjusted to employee work hours and incorporate client assignments.
SMALL CLASS SIZE:
There is a surcharge associated with training two or fewer students.
AUDIENCE:
Network Administrator
Support Personnel
Security Analyst
IT Professional
DATES:
CONTENT AND OBJECTIVES:
Installation Overview
List and examine the drives and disk space utilization for the disk partitions.
Operating System Concepts
Examine the components of the Solaris operating system.
Identify and analyze the differences among Solaris, UNIX, and Linux.
Accessing the System
Code a script which extracts user information and displays user permissions.
System Processes
Define multiple foreground and background processes.
Determine and display information about each of the running processes.
List the priority of the processes.
Kill processes using signals.
Archiving User Data
Compress the files and directories provided by the instructor.
Determine the fastest technique.
Identify and analyze the most efficient compression technique among: zip, tar, and gz.
User Account and Group Management
Code a script which will create user and group accounts and update all the users in a group.
Customize the environment for 1- a user. 2- application developer.
Add rights or a role to a user which will allow the user to perform a specific command or task.
File Types and Devices
Use the format utility to identify the disk types.
Determine whether a disk has been formatted.
Use the prtvtoc command to examine the disk label.
Use the format utility to identify a defective disk sector.
Software Package Administration
Install and remove a software package with a graphical tool.
Install and remove a software package with an installer.
Check the installation of a software package.
List and examine software package information.
Display software package parameter values.
Virtual Classroom
Blended Learning
↓
Synchronous Instruction
Asynchronous Instruction
Effective February 27, 2012, the course dates listed on the CETi schedules only will be available based upon approved and authorized user ID.
Copyright Acknowledgement: The software product(s) listed in this outline are owned and copyrighted by their respective companies. CETi makes no representation regarding ownership in any of the software products that we train on.
CETi courses are not intended for or open to the general public. They are intended for employees of Fortune 1000 companies, government municipalities, consulting companies, software, companies, healthcare providers. and mid-sized businesses. Individuals attending such courses will be required to execute a statement acknowledging that the employer will be paying for the CETi course and that the employer has a licensed version of the software.
Certain courses only should be taught by the source software company training company and open source purveyor.