Gl120 Linux Fundamentals Rhel7 Sles12 U16.04

Gl120 Linux Fundamentals Rhel7 Sles12 U16.04

EVALUATION COPY Unauthorized Reproduction or Distribution Linux Prohibited Fundamentals Student Workbook EVALUATION COPY Unauthorized Reproduction GL120 LINUX FUNDAMENTALS RHEL7 SLES12 U16.04 or Distribution The contents of this course and all its modules and related materials, including handouts to audience members, are copyright ©2017 Guru Labs L.C. No part of this publication may be stored in a retrieval system, transmitted or reproduced in any way, including, but not limited to, photocopy, photograph, magnetic, electronic or other record, without the prior written permission of Guru Labs. This curriculum contains proprietary information which is for the exclusive use of customers of Guru Labs L.C., and is not to be shared with personnel other than those in attendance at this course. This instructional program, including all material provided herein, is supplied without any guarantees from Guru Labs L.C. Guru Labs L.C. assumes no liability for damages or legal action arising from Prohibited the use or misuse of contents or details contained herein. Photocopying any part of this manual without prior written consent of Guru Labs L.C. is a violation of federal law. This manual should not appear to be a photocopy. If you believe that Guru Labs training materials are being photocopied without permission, please email [email protected] or call 1-801-298-5227. Guru Labs L.C. accepts no liability for any claims, demands, losses, damages, costs or expenses suffered or incurred howsoever arising from or in connection with the use of this courseware. All trademarks are the property of their respective owners. Version: GL120S-R7S12U1604-T03 EVALUATION COPY Unauthorized Reproduction or Distribution Prohibited Table of Contents Chapter 1 EVALUATIONUnix/Linux FilesystemCOPY Features 3 WHAT IS LINUX? 1 Filesystem Hierarchy Standard 4 Unix and its Design Principles 2 Navigating the Filesystem 6 FSF and GNU Unauthorized 4 Displaying Directory Contents 7 GPL – General Public License 5 Filesystem Structures 9 The Linux Kernel 6 Determining Disk Usage With df and du 10 Linux Kernel and Versioning 7 Determining Disk Usage (GUI) 11 Components of a Distribution 9 Disk Usage with Quotas 13 Slackware 10 File Ownership 14 SUSE Linux Products 11 Default Group Ownership 15 Debian 12 File and Directory Permissions 16 Ubuntu 13 File Creation Permissions with umask 18 Red Hat Linux Products 14 SUID and SGID on files 20 Oracle Linux Reproduction 16 SGID and Sticky Bit on Directories 21 Changing File Permissions 22 Chapter 2 User Private Group Scheme 24 LOGIN AND EXPLORATION 1 Lab Tasks 26 Logging In 2 1. Navigating Directories and Listing Files 27 Running Programs 3 2. Disk and Filesystem Usage 29 Interacting with Command Line 4 3. File and Directory Ownership and Permissions 31 Desktop Environments 6 4. Introduction to Troubleshooting Labs [R7 S12] 36 GNOME 7 5. Troubleshooting Practice: Filesystem [R7 S12] 41 Starting X or9 Gathering Login Session Info 11 DistributionChapter 4 Gathering System Info 12 MANIPULATING FILES 1 uptime & w 14 Directory Manipulation 2 got root? 15 File Manipulation 3 Switching User Contexts 16 Deleting and Creating Files 4 sudo 17 Managing Files Graphically 5 Help from Commands and Documentation 19 Drag and drop with Nautilus 6 whereis 20 Physical Unix File Structure 7 Getting Help Within the Graphical Desktop 21 Filesystem LinksProhibited 8 Getting Help with man & info 22 File Extensions and Content 9 Lab Tasks 24 Displaying Files 10 1. Login and Discovery 25 Previewing Files 12 2. Help with Commands 30 Producing File Statistics 13 3. Switching Users With su 34 Displaying Binary Files 14 Searching the Filesystem 16 Chapter 3 Alternate Search Method 17 THE LINUX FILESYSTEM 1 Lab Tasks 18 Filesystem Support 2 1. Manipulating Files and Directories 19 ii 2. File Examination & Search Commands 23 Extracting Columns of Text 9 Combining Files and Merging Text 10 Chapter 5 EVALUATIONComparing COPY File Changes 12 SHELL BASICS 1 Lab Tasks 14 Role of Command Shell 2 1. Processing Text Streams 15 CommunicationUnauthorized Channels 3 2. Text Processing 17 File Redirection 4 Piping Commands Together 5 Chapter 8 Filename Matching 6 REGULAR EXPRESSIONS 1 File Globbing and Wildcard Patterns 7 Regular Expression Overview 2 Brace Expansion 8 Regular Expressions 3 Shell and Environment Variables 9 RE Character Classes 4 Key Environment Variables 10 Regex Quantifiers 5 Which and Type 12 RE Parenthesis 6 General Quoting Rules Reproduction 14 Lab Tasks 7 Nesting Commands 16 1. Pattern Matching with Regular Expressions 8 Lab Tasks 17 2. Extended Regular Expressions 10 1. Redirection and Pipes 18 3. Using Regular Expressions With sed 14 2. Wildcard File Matching 25 3. Shell Variables 27 Chapter 9 4. Shell Meta-Characters 30 TEXT EDITING 1 5. Command Substitution 33 Text Editing 2 Pico/GNU Nano 3 Chapter 6 or Pico/Nano Interface 4 ARCHIVING AND COMPRESSION 1 Nano configuration 5 Archives with tar 2DistributionPico/Nano Shortcuts 6 Archives with cpio 3 vi and Vim 7 The gzip Compression Utility 4 Learning Vim 8 The bzip2 Compression Utility 5 Basic vi 9 The XZ Compression Utility 6 Intermediate vi 10 The PKZIP Archiving/Compression format 7 Lab Tasks 13 GNOME File Roller 8 1. Text Editing with Nano 14 Lab Tasks 9 2. Text Editing with Vim 17 1. Archiving and Compression 10 Prohibited Chapter 10 Chapter 7 MESSAGING 1 TEXT PROCESSING 1 System Messaging Commands 2 Searching Inside Files 2 Controlling System Messaging 3 The Streaming Editor 3 Internet Relay Chat 4 Text Processing with Awk 4 Instant Messenger Clients 5 Replacing Text Characters 6 Electronic Mail 6 Text Sorting 7 Sending Email with sendmail 7 Duplicate Removal Utility 8 Sending and Receiving Email with mailx 8 iii Sending and Receiving Email with mutt 10 The borne for-Loop 13 Sending Email with Pine 11 The while and until Loops 14 Evolution EVALUATION13 Lab Tasks COPY 15 Lab Tasks 14 1. Writing a Shell Script 16 1. Command Line Messaging 15 2. Messaging withUnauthorized talkd 17 Chapter 13 3. Command Line Email 20 PROCESS MANAGEMENT AND JOB CONTROL 1 4. Alpine 22 What is a Process? 2 Process Lifecycle 3 Chapter 11 Process States 4 COMMAND SHELLS 1 Viewing Processes 5 Shells 2 Signals 7 Identifying the Shell 4 Tools to Send Signals 8 Changing the Shell 5 nohup and disown 9 Configuration Files Reproduction 6 Managing Processes 10 Script Execution 7 Tuning Process Scheduling 11 Shell Prompts 8 Job Control Overview 13 Bash: Bourne-Again Shell 9 Job Control Commands 14 Bash: Configuration Files 10 Persistent Shell Sessions with Screen 15 Bash: Command Line History 11 Using screen 16 Bash: Command Editing 13 Advanced Screen 18 Bash: Command Completion 15 Lab Tasks 19 Bash: "shortcuts" 16 1. Job Control Basics 20 Bash: prompt 17or 2. Process Management Basics 25 Setting Resource Limits via ulimit 18 3. Screen Basics 28 Lab Tasks 19 Distribution4. Using Screen Regions 31 1. Linux Shells 20 5. Troubleshooting Practice: Process Management [R7 S12] 34 2. Bash History 24 3. Aliases 27 Chapter 14 4. Bash Login Scripts 29 AT AND CRON 1 5. The Z Shell 31 Automating Tasks 2 at/batch 3 Chapter 12 cron 5 INTRODUCTION TO SHELL SCRIPTING 1 The crontab CommandProhibited 6 Shell Script Strengths and Weaknesses 2 crontab Format 7 Example Shell Script 3 /etc/cron.*/ Directories 8 Positional Parameters 4 Anacron 10 Input & Output 5 Lab Tasks 12 Doing Math 7 1. Creating and Managing User Cron Jobs 13 Exit Status 8 2. Adding System cron Jobs 16 Comparisons with test 9 3. Troubleshooting Practice: Automating Tasks [R7 S12] 18 Conditional Statements 10 Flow Control: case 11 iv Chapter 15 Chapter 17 MANAGING SOFTWARE 1 MOUNTING FILESYSTEMS & MANAGING REMOVABLE MEDIA 1 Downloading withEVALUATION FTP 2 Filesystems COPY Concept Review 2 FTP 3 Mounting Filesystems 3 lftp 5 NFS 4 Command LineUnauthorized Internet – Non-interactive 6 SMB 5 Command Line Internet – Interactive 8 Filesystem Table (/etc/fstab) 6 Managing Software Dependencies 9 AutoFS 7 Using the Yum command 11 Removable Media 8 Using Yum history 14 Lab Tasks 9 YUM package groups 17 1. Accessing NFS Shares 10 Configuring Yum 18 2. On-demand filesystem mounting with AutoFS 12 yumdownloader 20 Popular Yum Repositories 21 Chapter 18 Using the Zypper command Reproduction 22 PRINTING 1 Zypper Services and Catalogs 24 Legacy Print Systems 2 The dselect & APT Frontends to dpkg 26 Common UNIX Printing System 3 Aptitude 27 Defining a Printer 4 Configuring APT 28 Standard Print Commands 6 Lab Tasks 30 Format Conversion Utilities 8 1. Command Line File Transfers 31 enscript and mpage 9 2. Using Yum [R7] 35 Lab Tasks 11 3. Using Zypper [S12] 42 1. Printing 12 4. Managing Yum Repositories [R7] or47 2. Configuring Print Queues 16 5. Managing Zypper Repositories [S12] 50 6. Using APT [U1604] 53DistributionAppendix A 7. Adding an APT repository [U1604] 55 THE X WINDOW SYSTEM 1 The X Window System 2 Chapter 16 X Modularity 3 THE SECURE SHELL (SSH) 1 X.Org Drivers 4 Secure Shell 2 Configuring X Manually 5 OpenSSH Client & Server Configuration 3 Automatic X Configuration 7 Accessing Remote Shells 4 Xorg and Fonts 8 Transferring Files 5 Installing FontsProhibited for Modern Applications 10 Alternative sftp Clients 6 Installing Fonts for Legacy Applications 12 SSH Key Management 8 The X11 Protocol and Display Names 13 ssh-agent 9 Display Managers and Graphical Login 14 Lab Tasks 10 Starting X Apps Automatically 16 1. Introduction to ssh and scp 11 X Access Control 18 2. SSH Key-based User Authentication 13 Remote X Access (historical/insecure) 20 3. Using ssh-agent 15 Remote X Access (modern/secure) 22 XDMCP 24 Remote Graphical Access With VNC and RDP 26 v Specialized X Servers 27 Lab Tasks 28 1.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    65 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us