PRIVATE GROUP FEE:
$ Based upon a class size of six students.
Scheduling can be adjusted to employee work hours and incorporate client assignments.
SMALL CLASS SIZE:
There is a surcharge associated with training two or fewer students.
AUDIENCE:
Network Administrator
Support Personnel
Security Analyst
IT Professional
DATES:
CONTENT AND OBJECTIVES:
Introduction
Become familiar with the concepts and terminology of Linux/UNIX.
Establishing Communication
Communicate between two users in the system.
Using the write and talk commands, send information to another user.
Send an e-mail and check for e-mails.
File System
Move through the file system and get file information.
1- Create multiple directories. 2- Set permissions. 3- Navigate through the directories.
Use full path name, partial paths and variables containing directory names.
File Management
Perform file manipulation: 1- Copy a file. 2- Move a file. 3- Search for a file. 4- Rename a file. 5- Reset permission and ownership. 6- Check the size of files.
UNIX Permissions
Read the octal permissions.
Set file and directory permission and check the permission mask.
Redirection, Filters, and Pipes
Use filter and pipes in the command-line.
Pass the output of one command to the input of another command.
vi Editor
Acquire proficiency with the vi editor.
1- Create a file. 2- Setup macros. 3- Configure the vi control file. 4- Combine vi commands.
Shell Scripts
Create shell scripts.
Create a shell script that is supplied a file name and search for a string.
Once the string is found, indicate the line number of the string.
UNIX Shells and Variables
Create variables and use the variables in commands.
Store the name of a user in a variable and send that user an e-mail.
UNIX C Shell User Environment
Understand the start-up process for the C shell.
Customize the environment by updating the .login and the .cshrc files.
Aliases in the C shell
Create, list and remove aliases.
Aliases can be used to make mnemonics for complex frequently used commands.
Create an alias for a non trival command.
History in the C shell
Utilize the history feature in C shell; list all the elements in the history.
Execute a specific command and then execute the last command.
View a specific command.
Korn Shell Programming
Code and test several korn shell scripts to manipulate files and perform calculations.
Write a script that will echo the third parameter, if it is present.
Given a file of numbers, a single number per line, write a script that will find the lowest and highest number.
Write a script that will recognize if a word entered from the keyboard starts with an upper or lower case character or a digit.
System Status and Command Information
Determine the system status standard UNIX commands.
List statistics about the UNIX system using the following utilities: uptime, who, top, vmstat, iostat and ps.
Multitasking Capabilities
Run multiple programs where one program forks another.
Create children and determine what is being inherited by the child.
Advanced File Management
Execute grep and egrep to search file(s).
Search files using regular expressions.
Transferring and Printing Files
Create tar archives and use the compression utilities.
Create a tar of a directory and compress the tar; restore the tar in a different directory.
Command-line Database Processing
Become proficient with the awk utility.
Use the awk utility to reformat a file and search for specific records.
Virtual Classroom
Blended Learning
↓
Synchronous Instruction
Asynchronous Instruction
Effective February 27, 2012, the course dates listed on the CETi schedules only will be available based upon approved and authorized user ID.
Copyright Acknowledgement: The software product(s) listed in this outline are owned and copyrighted by their respective companies. CETi makes no representation regarding ownership in any of the software products that we train on.
CETi courses are not intended for or open to the general public. They are intended for employees of Fortune 1000 companies, government municipalities, consulting companies, software, companies, healthcare providers. and mid-sized businesses. Individuals attending such courses will be required to execute a statement acknowledging that the employer will be paying for the CETi course and that the employer has a licensed version of the software.
Certain courses only should be taught by the source software company training company and open source purveyor.