

Modules
1 -
Introduction
#
Lesson
Duration
Type
1.
Introduction
15m:23s

2.
Download your free study guide

3.
Exam Tips
10m:23s

4.
100% Pass Guarantee
4m:22s

5.
Our Lab Environment
6m:31s

6.
Using the Lab Environment

7.
Checkpoint: Introduction

2 -
Linux Concepts
#
Lesson
Duration
Type
1.
Linux Concepts
4m:32s

2.
Boot Process
8m:13s

3.
System Directories
15m:51s

4.
User and Application-related Directories
8m:12s

5.
Server Architectures
6m:46s

6.
Linux Distributions
8m:13s

7.
Graphical User Interface (GUI)
6m:39s

8.
Software Licensing
5m:36s

9.
Checkpoint: Linux Concepts

3 -
Shell Operations
#
Lesson
Duration
Type
1.
Shell Operations
8m:14s

2.
User and Session Environmental Variables
6m:59s

3.
System and Execution Environmental Variables
8m:19s

4.
Paths
5m:28s

5.
Environment Configurations
10m:22s

6.
Input Redirection
11m:30s

7.
Output Redirection
12m:2s

8.
History and Shortcuts
8m:27s

9.
Regex
11m:41s

10.
Search and Extract
6m:0s

11.
Modify and Replace
5m:47s

12.
Sort and Count
12m:18s

13.
View and Navigate
7m:46s

14.
Output and Redirect
10m:21s

15.
Math and Format
6m:41s

16.
System and Scripts
6m:35s

17.
Text editors
9m:50s

18.
Checkpoint: Shell Operations

4 -
Device Management
#
Lesson
Duration
Type
1.
Device Management
5m:29s

2.
Kernel Module Management
7m:0s

3.
Module Information and Dependency Handling
8m:39s

4.
Hardware Information Commands
8m:44s

5.
Hardware Inventory Commands
10m:1s

6.
System Monitoring and Diagnostics Commands
7m:25s

7.
Initrd Management
7m:32s

8.
Custom Hardware
6m:9s

9.
Checkpoint: Device Management

5 -
Storage Management
#
Lesson
Duration
Type
1.
Storage Management
10m:10s

2.
Partition Information Commands
7m:17s

3.
Partition Management Commands
12m:5s

4.
Redundant Array of Independent Disks (RAID)
11m:41s

5.
Basic Physical Volume Management
8m:52s

6.
Modifying and Removing Physical Volumes
5m:24s

7.
Basic Volume Group Management
8m:15s

8.
Modifying and Removing Volume Groups
11m:15s

9.
Basic Logical Volume Management
6m:8s

10.
Modifying and Removing Logical Volumes
8m:37s

11.
Static and System Mount Information
11m:21s

12.
Dynamic Mounting and Automounting
7m:42s

13.
Performance & Accessibility Mount Options
7m:55s

14.
Security & Restriction Mount Options
6m:57s

15.
Network Mounts
6m:30s

16.
Filesystems Formats
6m:46s

17.
Inodes
6m:16s

18.
Filesystem Utilities
12m:48s

19.
Checkpoint: Storage Management

6 -
File and Directory Management
#
Lesson
Duration
Type
1.
File and Directory Management
4m:52s

2.
Navigation and Directory Management Commands
8m:46s

3.
File Operation Commands
7m:31s

4.
File Information and Search Commands
8m:12s

5.
File Comparison and Usage Commands
7m:18s

6.
File Links
11m:51s

7.
/dev Device Types
6m:6s

8.
Checkpoint: File and Directory Management

7 -
Local Account Management
#
Lesson
Duration
Type
1.
Local Account Management
6m:21s

2.
Add
7m:22s

3.
Delete
5m:49s

4.
Modify
8m:19s

5.
Lock
9m:40s

6.
Expiration
7m:49s

7.
User Information
7m:30s

8.
Login/Session Tracking
7m:35s

9.
User Profile Templates
4m:38s

10.
Account Files
7m:18s

11.
Attributes
6m:36s

12.
Account Comparisons
4m:6s

13.
Checkpoint: Local Account Management

8 -
Processes
#
Lesson
Duration
Type
1.
Processes
6m:30s

2.
Process ID
6m:24s

3.
Process States
6m:11s

4.
Process Priority
5m:23s

5.
Process Monitoring
6m:45s

6.
Performance Metrics
4m:51s

7.
Diagnostic and Debugging Tools
6m:21s

8.
Process Limits
6m:8s

9.
Job Control Commands
5m:47s

10.
Background Execution Commands
3m:32s

11.
Signals and Process Termination
8m:43s

12.
Shell and Process Invocation
4m:40s

13.
Job Scheduling
10m:31s

14.
Checkpoint: Processes

9 -
Software Configuration and Management
#
Lesson
Duration
Type
1.
Software Configuration and Management
6m:29s

2.
Package Managers by Distributions
13m:55s

3.
System-Level Package Management
5m:37s

4.
Manual or Specialized Installations
7m:24s

5.
Repository Management
5m:49s

6.
Debian-based Package and Repository Exclusions
4m:47s

7.
RHEL-based Package and Repository Exclusions
3m:48s

8.
openSUSE-based Package and Repository Exclusions
4m:25s

9.
Update Alternatives
5m:14s

10.
Software Configuration
4m:6s

11.
Sandboxed Applications
5m:49s

12.
Core-level Service Configuration
9m:48s

13.
Application-level Service Configuration
6m:39s

14.
Checkpoint: Software Configuration and Management

10 -
Systemd
#
Lesson
Duration
Type
1.
Systemd
5m:6s

2.
Units
13m:58s

3.
Management Utilities
6m:5s

4.
Configuration Utilities
8m:10s

5.
Analysis and Diagnostic Utilities
3m:58s

6.
Configuration and Reloading Unit States
4m:14s

7.
Boot-Time State Management
9m:24s

8.
Service Control
5m:38s

9.
Checkpoint: Systemd

11 -
Virtualization
#
Lesson
Duration
Type
1.
Virtualization
5m:39s

2.
Bare metal vs virtual machines
4m:45s

3.
Hypervisors
4m:10s

4.
VM Architecture and Performance
7m:33s

5.
Operations
5m:9s

6.
VM Resources
7m:11s

7.
VM Management
6m:34s

8.
Network Types
6m:28s

9.
VM Tools
8m:30s

10.
Checkpoint: Virtualization

12 -
Containers
#
Lesson
Duration
Type
1.
Containers
6m:39s

2.
Runtimes
6m:57s

3.
Building an Image
8m:43s

4.
Image Retrieval and Maintenance
6m:15s

5.
Container Lifecyle Management
5m:14s

6.
Container Inspection and Interaction
6m:46s

7.
Container Storage and Tagging
3m:53s

8.
Volume Management Operations
3m:55s

9.
Volume Security and Filesystem Operations
8m:49s

10.
Network Management Operations
5m:7s

11.
Local Networks
6m:21s

12.
Advanced and Overlay Networks
5m:8s

13.
Privileged vs Unprivileged
5m:24s

14.
Checkpoint: Containers

13 -
Network Services and Configurations
#
Lesson
Duration
Type
1.
Network Services and Configurations
6m:30s

2.
Network Configuration
10m:20s

3.
NetworkManager
5m:5s

4.
Netplan
6m:44s

5.
IP Network Manangement Tool
6m:29s

6.
Network Configuration Tools
6m:2s

7.
Network Connectivity Tools
7m:23s

8.
Scanning and Traffic Analysis Tools
13m:10s

9.
DNS Tools
10m:41s

10.
Checkpoint: Network Services and Configurations

14 -
Backup and Restore Operations
#
Lesson
Duration
Type
1.
Backup and Restore Operations
5m:33s

2.
Relative Paths
4m:26s

3.
Archiving
5m:55s

4.
Compression Tools
8m:0s

5.
Decompression Tools
6m:17s

6.
Data Copy and Recovery
7m:23s

7.
Compressed File Operations
5m:25s

8.
Checkpoint: Backup and Restore Operations

15 -
Authorization, Authentication, and Accounting Methods
#
Lesson
Duration
Type
1.
Authorization, Authentication, and Accounting Methods
5m:52s

2.
Local Authentication
12m:22s

3.
Directory-based Identity Management
5m:33s

4.
Network / Domain Integration
4m:35s

5.
Logging
7m:25s

6.
System Audit
6m:36s

7.
Checkpoint: Authorization, Authentication, and Accounting Methods

16 -
Firewall Implementation
#
Lesson
Duration
Type
1.
Firewall Implementation
6m:50s

2.
Firewalld Configuration and Management
6m:55s

3.
Firewalld Rules and Access Control
5m:54s

4.
Uncomplicated Firewall
6m:2s

5.
Firewall Implementations
11m:32s

6.
Netfilter Module
3m:18s

7.
Types of Address Translation
5m:55s

8.
Network Address Translation Variants
3m:34s

9.
Stateful vs Stateless
9m:33s

10.
IP forwarding
4m:20s

11.
Checkpoint: Firewall Implementation

17 -
Hardening Techniques
#
Lesson
Duration
Type
1.
Account Hardening Techniques
4m:55s

2.
Password Composition Controls
4m:20s

3.
Password Lifecyle Controls
7m:57s

4.
MFA
8m:15s

5.
Checking existing breach lists
6m:2s

6.
Restricted shell use
4m:59s

7.
pam_tally2
4m:45s

8.
Avoid running as root
9m:27s

9.
Checkpoint: Hardening Techniques

18 -
Cryptographic Concepts
#
Lesson
Duration
Type
1.
Cryptographic Concepts
5m:47s

2.
Data at Rest - File Encryption
4m:1s

3.
Data at Rest - Filesystem Encryption
6m:15s

4.
Data in Transit - OpenSSL
8m:49s

5.
Data in Transit Protection Methods
5m:31s

6.
Hashing
9m:37s

7.
Removal of Weak Algorithms
5m:53s

8.
Certificate Management
4m:20s

9.
Self-Signed Certificates
4m:13s

10.
Checkpoint: Cryptographic Concepts

19 -
Compliance and Audit Procedures
#
Lesson
Duration
Type
1.
Compliance and Audit Procedures
6m:22s

2.
Detection and Response
3m:46s

3.
Vulnerability Categorization
5m:9s

4.
Vulnerability Management
3m:57s

5.
Vulnerability Detection
5m:13s

6.
Standards and Audit
3m:52s

7.
File Integrity Verification
3m:46s

8.
File Integrity Tools
5m:25s

9.
Data Destruction Overwriting Tools
7m:52s

10.
Cryptographic Data destruction
9m:49s

11.
Software Supply Chain
5m:47s

12.
Security Banners
8m:3s

13.
Checkpoint: Compliance and Audit Procedures

20 -
Operating System Hardening
#
Lesson
Duration
Type
1.
Operating System Hardening
9m:20s

2.
sudo Configuration
7m:45s

3.
sudoers Directives
5m:38s

4.
sudo User Groups
6m:49s

5.
Root shell
3m:40s

6.
File Attributes
8m:13s

7.
File Permisssions
4m:49s

8.
File Modifications
8m:18s

9.
File Special Permissions
7m:10s

10.
Default File Creation Mask
5m:29s

11.
ACLs
4m:47s

12.
SELinux States
4m:58s

13.
SELinux Mode Management
3m:48s

14.
SELinux File Security Contexts
9m:15s

15.
SELinux system-wide configuration
8m:47s

16.
SELinux Logging and Troubleshooting
6m:22s

17.
SSHD Secure Authentication and Access Control
7m:19s

18.
SSHD Secure Configuration and Usage
4m:40s

19.
Secure Remote Access
5m:47s

20.
fail2ban
6m:46s

21.
Avoid Unsecure Services
5m:15s

22.
Disable Unused File Systems
4m:16s

23.
Unnecessary SUID Permissions
5m:26s

24.
Secure Boot
3m:38s

25.
Checkpoint: Operating System Hardening

21 -
Automation and Orchestration
#
Lesson
Duration
Type
1.
Automation and Orchestration
6m:57s

2.
Ansible IaC Core Concepts
13m:25s

3.
Ansible IaC Advanced Usage
4m:3s

4.
Puppet Core Usage
4m:36s

5.
Puppet Advanced Usage
3m:40s

6.
OpenTofu Core Usage
5m:19s

7.
OpenTofu Advanced Usage
3m:32s

8.
Unattended Deployment
5m:31s

9.
Foundational CI/CD Concepts
4m:31s

10.
Modern CI/CD Approaches
4m:45s

11.
Kubernetes Core Workloads for Deployment Orchestration
4m:53s

12.
Kubernetes Configuration
7m:2s

13.
Docker Swarm Core Workloads for Deployment Orchestration
4m:40s

14.
Docker Swarm Configuration
4m:26s

15.
Docker/Podman Compose for Deployment Orchestration
7m:15s

16.
Checkpoint: Automation and Orchestration

22 -
Automated Tasks with Shell Scripting
#
Lesson
Duration
Type
1.
Automated Tasks with Shell Scripting
7m:44s

2.
Parameter Expansion
5m:0s

3.
Command Substitution
6m:48s

4.
Subshell Execution
6m:44s

5.
Functions
8m:53s

6.
Internal Field Seperator / Output Field Separator
8m:58s

7.
Conditional Statements
6m:27s

8.
Looping Statements
5m:5s

9.
Interpreter Directive
2m:48s

10.
Numerical Comparisons
7m:1s

11.
Redirection String Operators
4m:38s

12.
Comparison String Operators
8m:12s

13.
Regular Expressions
6m:56s

14.
Test Operators
5m:56s

15.
Variables
4m:40s

16.
Alias and Command Management
5m:25s

17.
Variable Management
6m:53s

18.
Return Codes
7m:43s

19.
Checkpoint: Automated Tasks with Shell Scripting

23 -
Python Basics
#
Lesson
Duration
Type
1.
Python Basics
4m:6s

2.
Setting up a virtual environment
4m:25s

3.
Built-in modules
6m:47s

4.
Installing dependencies
4m:55s

5.
Python Fundamentals
4m:4s

6.
Python Data Types
5m:3s

7.
Python Structures
4m:25s

8.
Extensibility using Python modules and packages
9m:23s

9.
PEP 8 Best Practices
3m:28s

10.
Checkpoint: Python Basics

24 -
Implement Git
#
Lesson
Duration
Type
1.
Implement Git
4m:37s

2.
Git Basics
5m:45s

3.
Git Changes
7m:39s

4.
Git Versions
9m:9s

5.
Git Repositories
14m:44s

6.
Managing Git Workflows
6m:16s

7.
Checkpoint: Implement Git

25 -
Use of Artificial Intelligence
#
Lesson
Duration
Type
1.
Use of Artificial Intelligence
5m:8s

2.
Code Generation Use Cases
8m:47s

3.
Code Quality Use Cases
4m:38s

4.
Security and Compliance Use Cases
3m:26s

5.
AI Best Practices
4m:55s

6.
AI Data Governance
4m:4s

7.
AI Local Models
4m:15s

8.
Prompt Engineering
14m:48s

9.
Checkpoint: Use of Artificial Intelligence

26 -
Monitoring Concepts and Configurations
#
Lesson
Duration
Type
1.
Monitoring Concepts and Configurations
4m:33s

2.
Service Monitoring
4m:59s

3.
Network Monitoring
5m:2s

4.
Event-driven Data Collection
7m:12s

5.
Event Management
6m:7s

6.
Alerting and Notifications
4m:49s

7.
Checkpoint: Monitoring Concepts and Configurations

27 -
Troubleshooting Hardware, Storage, and Linux OS
#
Lesson
Duration
Type
1.
Troubleshooting Hardware, Storage, and Linux OS
4m:44s

2.
Boot Issues
9m:33s

3.
Filesystem Issues
7m:22s

4.
Process Issues
6m:34s

5.
System Issues
5m:57s

6.
Dependency Issues
7m:33s

7.
Checkpoint: Troubleshooting Hardware, Storage, and Linux OS

28 -
Troubleshooting Networking Issues
#
Lesson
Duration
Type
1.
Troubleshooting Networking Issues
4m:11s

2.
Firewall Issues
6m:43s

3.
Addressing Issues
5m:32s

4.
Routing Issues
7m:53s

5.
Interface Misconfiguration
9m:8s

6.
Link Issues
4m:48s

7.
Checkpoint: Troubleshooting Networking Issues

29 -
Troubleshooting Security Issues
#
Lesson
Duration
Type
1.
Troubleshooting Security Issues
4m:29s

2.
SELinux Issues
12m:41s

3.
File and Directory Permission Issues
5m:27s

4.
Access Issues
6m:25s

5.
Configuration Issues
4m:24s

6.
Vulnerabilities
7m:12s

7.
Checkpoint: Troubleshooting Security Issues

30 -
Troubleshooting Performance Issues
#
Lesson
Duration
Type
1.
Troubleshooting Performance Issues
5m:58s

2.
CPU Issues
7m:44s

3.
Memory Issues
5m:6s

4.
Disk I/O Issues
8m:33s

5.
Network Stability Issues
5m:41s

6.
Network Performance Issues
6m:56s

7.
System Responsiveness Issues
6m:49s

8.
Process Management Issues
4m:36s

9.
Security-related Performance Issues
4m:18s

10.
Checkpoint: Troubleshooting Performance Issues

31 -
Conclusion
#
Lesson
Duration
Type
1.
Conclusion
15m:12s

2.
BONUS: Where to go from here?
3m:54s

3.
Practice Exam
