Technology Driven IT Training Longstanding IT Technologists Computer Education Techniques
Distance-learning - Solaris: Fundamentals

Home

distance-learning center

Application of Classic Teaching Models Mobile Classrooms

Professional Distance-learning

IT Training Services



UXLIN11

Solaris: Fundamentals
DURATION: 4 days

FEE: $1,580

PRIVATE GROUP FEE: $
Based upon a class size of six students.

Scheduling can be adjusted to employee work hours and incorporate client assignments.

SMALL CLASS SIZE:
There is a surcharge associated with training two or fewer students.

AUDIENCE:

  • Network Administrator
  • Support Personnel
  • Security Analyst
  • IT Professional
 
   

DATES:

HANDS-ON TRAINING:
    1. Introduction
      • Log in and out of the Solaris and Common Desktop Environment.
      • Acquire proficiency with Solaris: 1- Compose command-line strings to perform functions. 2- Navigate the directory tree. 3- Manipulate text files. 4- Create files and directories. 5- Backup and restore user files and directories. 6- Change the permissions of files and directories.
      • Learn how to use the vi editor.
      • Identify and modify initialization files.
      • Use network commands.
    2. Commands and Utilities
      • Create and set permissions and run a script.
      • Given specifications from the instructor, code and run a simple script.
      • Pass arguments to the script coded previously.
      • Configure the environment for creating an alias.
    3. File and Directories
      • List the file systems and determine the free space and options.
      • Determine the file permission of a group of files.
      • Copy a file into a different directory and change the ownership of the file.
      • Create a list of files and redirect that output into a file.
      • Use the grep utility to search for all files in a directory.
      • Submit a background job.
    4. UNIX Commands
      • Run commands which perform file manipulation functions.
      • Use the cut command for extracting the data from a file.
      • Sort a file based on a specific field in the file, then perform ascending and descending sorts.
      • Compare two files and list the differences between the files.
    5. vi Text Editor
      • Edit a file using vi.
      • Using an existing file: 1- Change the data. 2- Insert lines. 3- Insert multiple lines. 4- Navigate the data by moving to the top, the bottom, a specific line or a search value. 5- Delete and change lines. 6- Move and update lines. 7- Save the file.
    6. Execution Environment
      • Change the profile for a user.
      • Change the profile file to set environment variables, aliases, and prompt for an individual userid.
      • Switch the user's shells.
      • Invoke the editing mode on the command-line.
    7. Shell Programming
      • Code scripts that accept arguments.
      • Code two scripts; a simple and more advanced script to perform calculations on passed arguments.
    8. CDE: Common Desktop Environnent
      • Invoke the CDE and use the utilities.
      • Invoke dtpad to edit files and use it as a substitute for vi.
      • Invoke and use the Solaris Management Console to examine the roles of users.
    9. Korn Shell Programming
      • Code and test several korn shell scripts to manipulate files and perform calculations.
      • Write a script that will echo the third parameter, if it is present.
      • Given a file of numbers, a single number per line, write a script that will find the lowest and highest number.
      • Write a script that will recognize if a word entered from the keyboard starts with an upper or lower case character or a digit.
    10. sed
      • Execute the sed utilities for searching and modifying existing files.
      • Code the utility using saved scripts.
      • Convert a DOS - MS Windows file to UNIX format.
    11. awk Programming
      • Use awk to perform file manipulation.
      • Create a column delimited file with the following fields: First Name, Last Name, Phone Number, and Campaign Contributions.
      • The records will need to meet the conditions for performing several exercises.
      • Enter the awk command that will print: 1- All the phone numbers. 2- Dan's phone number. 3- Susan's name and phone number. 4- All last names beginning with D. 5- All first names beginning with C or E. 6- All first names containing only four characters. 7- The first names of all those in the 916 area code. 8- Mike's campaign contributions preceded by a dollar sign ($). 9- Last names followed by a comma followed by the first name.
 
 
    Web-based Training   Blended Learning    
Synchronous
Instruction
Asynchronous
Instruction
Value Added Service

Common Questions


Website

 

Effective February 27, 2012, the course dates listed on the SYS-ED schedules only will be available based upon approved and authorized user ID.

Copyright Acknowledgement: The software product(s) listed in this outline are owned and copyrighted by their respective companies. SYS-ED makes no representation regarding ownership in any of the software products that we train on.

SYS-ED courses are not intended for or open to the general public. They are intended for employees of Fortune 1000 companies, government municipalities, consulting companies, software, companies, healthcare providers. and mid-sized businesses. Individuals attending such courses will be required to execute a statement acknowledging that the employer will be paying for the SYS-ED course and that the employer has a licensed version of the software.