Technology Driven IT Training Longstanding IT Technologists Computer Education Techniques
Distance-learning - Linux/UNIX Fundamentals - Level 2

Home

distance-learning center

Application of Classic Teaching Models Mobile Classrooms

Professional Distance-learning

IT Training Services



UXSYS03

Linux/UNIX Fundamentals - Level 2
DURATION: 3 days

FEE: $1,485

PRIVATE GROUP FEE: $
Based upon a class size of six students.

Scheduling can be adjusted to employee work hours and incorporate client assignments.

SMALL CLASS SIZE:
There is a surcharge associated with training two or fewer students.

AUDIENCE:

  • Network Administrator
  • Support Personnel
  • Security Analyst
  • IT Professional
 
   

DATES:

HANDS-ON TRAINING:
    1. Introduction
      • Become familiar with the concepts and terminology of Linux/UNIX.
    2. Establishing Communication
      • Communicate between two users in the system.
      • Using the write and talk commands, send information to another user.
      • Send an e-mail and check for e-mails.
    3. File System
      • Move through the file system and get file information.
      • 1- Create multiple directories. 2- Set permissions. 3- Navigate through the directories.
      • Use full path name, partial paths and variables containing directory names.
    4. File Management
      • Perform file manipulation: 1- Copy a file. 2- Move a file. 3- Search for a file. 4- Rename a file. 5- Reset permission and ownership. 6- Check the size of files.
    5. UNIX Permissions
      • Read the octal permissions.
      • Set file and directory permission and check the permission mask.
    6. Redirection, Filters, and Pipes
      • Use filter and pipes in the command-line.
      • Pass the output of one command to the input of another command.
    7. vi Editor
      • Acquire proficiency with the vi editor.
      • 1- Create a file. 2- Setup macros. 3- Configure the vi control file. 4- Combine vi commands.
    8. Shell Scripts
      • Create shell scripts.
      • Create a shell script that is supplied a file name and search for a string.
      • Once the string is found, indicate the line number of the string.
    9. UNIX Shells and Variables
      • Create variables and use the variables in commands.
      • Store the name of a user in a variable and send that user an e-mail.
    10. UNIX C Shell User Environment
      • Understand the start-up process for the C shell.
      • Customize the environment by updating the .login and the .cshrc files.
    11. Aliases in the C shell
      • Create, list and remove aliases.
      • Aliases can be used to make mnemonics for complex frequently used commands.
      • Create an alias for a non trival command.
    12. History in the C shell
      • Utilize the history feature in C shell; list all the elements in the history.
      • Execute a specific command and then execute the last command.
      • View a specific command.
    13. Korn Shell Programming
      • Code and test several korn shell scripts to manipulate files and perform calculations.
      • Write a script that will echo the third parameter, if it is present.
      • Given a file of numbers, a single number per line, write a script that will find the lowest and highest number.
      • Write a script that will recognize if a word entered from the keyboard starts with an upper or lower case character or a digit.
    14. System Status and Command Information
      • Determine the system status standard UNIX commands.
      • List statistics about the UNIX system using the following utilities: uptime, who, top, vmstat, iostat and ps.
    15. Multitasking Capabilities
      • Run multiple programs where one program forks another.
      • Create children and determine what is being inherited by the child.
    16. Advanced File Management
      • Execute grep and egrep to search file(s).
      • Search files using regular expressions.
    17. Transferring and Printing Files
      • Create tar archives and use the compression utilities.
      • Create a tar of a directory and compress the tar; restore the tar in a different directory.
    18. Command-line Database Processing
      • Become proficient with the awk utility.
      • Use the awk utility to reformat a file and search for specific records.
 
 
    Web-based Training   Blended Learning    
Synchronous
Instruction
Asynchronous
Instruction
Value Added Service

Common Questions


Website

 

Effective February 27, 2012, the course dates listed on the SYS-ED schedules only will be available based upon approved and authorized user ID.

Copyright Acknowledgement: The software product(s) listed in this outline are owned and copyrighted by their respective companies. SYS-ED makes no representation regarding ownership in any of the software products that we train on.

SYS-ED courses are not intended for or open to the general public. They are intended for employees of Fortune 1000 companies, government municipalities, consulting companies, software, companies, healthcare providers. and mid-sized businesses. Individuals attending such courses will be required to execute a statement acknowledging that the employer will be paying for the SYS-ED course and that the employer has a licensed version of the software.