Technology Driven IT Training Longstanding IT Technologists Computer Education Techniques
Distance-learning - Linux/UNIX Fundamentals - Level 2

Home

distance-learning center

Distance-learning Distance-learning_Building

Professional Distance-learning

IT Training Services


UXSYS03

Linux/UNIX Fundamentals - Level 2
DURATION: 3 days

FEE: $1,485

PRIVATE GROUP FEE: $
Based upon a class size of six students.

Scheduling can be adjusted to employee work hours and incorporate client assignments.

SMALL CLASS SIZE:
There is a surcharge associated with training two or fewer students.

AUDIENCE:

  • Network Administrator
  • Support Personnel
  • Security Analyst
  • IT Professional
 
   

DATES:

CONTENT AND OBJECTIVES:
    1. Introduction
      • Become familiar with the concepts and terminology of Linux/UNIX.
    2. Establishing Communication
      • Communicate between two users in the system.
      • Using the write and talk commands, send information to another user.
      • Send an e-mail and check for e-mails.
    3. File System
      • Move through the file system and get file information.
      • 1- Create multiple directories. 2- Set permissions. 3- Navigate through the directories.
      • Use full path name, partial paths and variables containing directory names.
    4. File Management
      • Perform file manipulation: 1- Copy a file. 2- Move a file. 3- Search for a file. 4- Rename a file. 5- Reset permission and ownership. 6- Check the size of files.
    5. UNIX Permissions
      • Read the octal permissions.
      • Set file and directory permission and check the permission mask.
    6. Redirection, Filters, and Pipes
      • Use filter and pipes in the command-line.
      • Pass the output of one command to the input of another command.
    7. vi Editor
      • Acquire proficiency with the vi editor.
      • 1- Create a file. 2- Setup macros. 3- Configure the vi control file. 4- Combine vi commands.
    8. Shell Scripts
      • Create shell scripts.
      • Create a shell script that is supplied a file name and search for a string.
      • Once the string is found, indicate the line number of the string.
    9. UNIX Shells and Variables
      • Create variables and use the variables in commands.
      • Store the name of a user in a variable and send that user an e-mail.
    10. UNIX C Shell User Environment
      • Understand the start-up process for the C shell.
      • Customize the environment by updating the .login and the .cshrc files.
    11. Aliases in the C shell
      • Create, list and remove aliases.
      • Aliases can be used to make mnemonics for complex frequently used commands.
      • Create an alias for a non trival command.
    12. History in the C shell
      • Utilize the history feature in C shell; list all the elements in the history.
      • Execute a specific command and then execute the last command.
      • View a specific command.
    13. Korn Shell Programming
      • Code and test several korn shell scripts to manipulate files and perform calculations.
      • Write a script that will echo the third parameter, if it is present.
      • Given a file of numbers, a single number per line, write a script that will find the lowest and highest number.
      • Write a script that will recognize if a word entered from the keyboard starts with an upper or lower case character or a digit.
    14. System Status and Command Information
      • Determine the system status standard UNIX commands.
      • List statistics about the UNIX system using the following utilities: uptime, who, top, vmstat, iostat and ps.
    15. Multitasking Capabilities
      • Run multiple programs where one program forks another.
      • Create children and determine what is being inherited by the child.
    16. Advanced File Management
      • Execute grep and egrep to search file(s).
      • Search files using regular expressions.
    17. Transferring and Printing Files
      • Create tar archives and use the compression utilities.
      • Create a tar of a directory and compress the tar; restore the tar in a different directory.
    18. Command-line Database Processing
      • Become proficient with the awk utility.
      • Use the awk utility to reformat a file and search for specific records.

 
 
    Virtual Classroom   Blended Learning    
Synchronous
Instruction
Asynchronous
Instruction

 

Effective February 27, 2012, the course dates listed on the CETi schedules only will be available based upon approved and authorized user ID.

Copyright Acknowledgement: The software product(s) listed in this outline are owned and copyrighted by their respective companies. CETi makes no representation regarding ownership in any of the software products that we train on.

CETi courses are not intended for or open to the general public. They are intended for employees of Fortune 1000 companies, government municipalities, consulting companies, software, companies, healthcare providers. and mid-sized businesses. Individuals attending such courses will be required to execute a statement acknowledging that the employer will be paying for the CETi course and that the employer has a licensed version of the software.

Certain courses only should be taught by the source software company training company and open source purveyor.