101-500: LPIC-1 Exam 101

101-500: LPIC-1 Exam 101

Get ready for your exam by enrolling in our comprehensive training course. This course includes a full set of instructional videos designed to equip you with in-depth knowledge essential for passing the certification exam with flying colors.

$14.99 / $24.99

Introduction

  • 1. Course outline
    11m

Preperation of practice

  • 1. Installation Virtualbox
    5m
  • 2. Installation Ubuntu
    17m
  • 3. Installation Fedora
    11m
  • 4. Linux on Virtualbox
    5m

Introduction to the console

  • 1. Introduction to the console
    23m

101.1 Determine and configure hardware settings

  • 1. Virtual filesystems
    11m
  • 2. Devices filesystem
    5m
  • 3. Kernel modules
    17m
  • 4. Display hardware
    11m

101.2 Boot the system

  • 1. Boot process - part 1
    13m
  • 2. Boot process - part 2
    7m
  • 3. SysVinit
    19m
  • 4. upstart
    6m
  • 5. systemd
    10m

101.3 Change runlevels / boot targets and shutdown or reboot system

  • 1. Runlevel
    10m
  • 2. Boot targets
    17m

102.1: Plan hard disk partitioning

  • 1. Directory structure according to FHS
    24m
  • 2. SWAP
    6m
  • 3. Partitions
    15m
  • 4. Mount
    8m
  • 5. LVM
    9m

102.2: Install a boot manager

  • 1. GRUB Legacy
    8m
  • 2. GRUB 2
    8m

102.3: Manage shared libraries

  • 1. Shared Libraries
    13m

102.4: Use debian package management

  • 1. dpkg
    14m
  • 2. apt
    16m
  • 3. aptitude
    8m

102.5: Using RPM and YUM package management

  • 1. rpm
    14m
  • 2. yum
    14m
  • 3. zypper
    6m

102.6: Linux as guest virtualization

  • 1. Linux as guest virtualization
    15m

103.1: Working on the command line

  • 1. History, Manpages and echo
    13m
  • 2. bash, env, set, unset, export
    19m

103.2: Process text streams with filters

  • 1. cat, head, tail
    13m
  • 2. zcat, bzcat, xzcat
    3m
  • 3. nl, wc, od
    9m
  • 4. md5sum, sha256sum, sha512sum
    10m
  • 5. sort, uniq, tr, cut, paste
    22m
  • 6. sed, split
    10m

103.3: Basic file management

  • 1. cd, cp und mv
    23m
  • 2. touch, file und ls
    19m
  • 3. mkdir, rmdir, rm, find
    21m
  • 4. dd
    7m
  • 5. tar
    20m
  • 6. cpio
    11m
  • 7. gzip, gunzip, bzip2, bunzip2, xz, unxz
    10m
  • 8. File Globbing
    11m

103.4: Using streams, pipes and diversions

  • 1. STDIN, STDOUT, STDERR, <, <<, <<<, >, >>, |
    31m
  • 2. xargs
    8m

103.5: Create, monitor and terminate processes

  • 1. ps, top, uptime, free
    21m
  • 2. pgrep, kill
    17m
  • 3. pkill, killall
    6m
  • 4. nohup, screen, tmux
    17m
  • 5. watch
    2m

103.6: Change process execution priorities

  • 1. nice, renice, ps, top
    9m

103.7: Searching text files with regular expressions

  • 1. regex, grep, egrep, fgrep
    16m

103.8: Basic editing of files

  • 1. vi - Part 1
    15m
  • 2. vi - Part 2
    11m

104.1: Create partitions and file systems

  • 1. File systems, fdisk part 1
    13m
  • 2. fdisk part 2, mkfs, mkswap
    24m
  • 3. gdisk, parted
    10m

104.2: Ensuring the integrity of file systems

  • 1. du, df
    7m
  • 2. fsck, mke2fs
    8m
  • 3. tune2fs
    7m
  • 4. xfs_repair, xfs_db, xfs_fsr
    5m

104.3: Controlling the mounting and unmounting of file systems

  • 1. mount, umount
    9m
  • 2. /etc/fstab
    10m
  • 3. blkid, systemd mount units
    10m

104.5: Manage file access rights and ownership

  • 1. Permissions, chmod
    17m
  • 2. Sticky Bit, SETUID, SETGID
    17m
  • 3. chown, chgrp
    8m
  • 4. umask
    13m

104.6: Creating and changing symbolic and hard links

  • 1. hardlink, softlink, ln
    11m

104.7: Find system files and put files in the right place

  • 1. locate, whereis, which, type
    13m

105.1: Customize and use the shell environment

  • 1. The shell environment
    14m
  • 2. Variables
    17m

105.2: Adapt or write simple scripts

  • 1. Chained commands
    10m
  • 2. Variables
    14m
  • 3. if, then, elif, else, read
    30m
  • 4. case
    8m
  • 5. while, do, done
    7m
  • 6. for, seq
    6m
  • 7. test, exec
    4m

106.1: Install and configure X11

  • 1. Debian installation without X window
    10m
  • 2. X-Window System
    11m
  • 3. DISPLAY, xhost, xauth
    14m
  • 4. Display and window manager
    3m

106.2: Graphic desktops

  • 1. KDE, Gnome, Xfce, X11, XDMCP, VNC, Spice, RDP
    9m

106.3: Accessibility

  • 1. Accessibility
    10m

107.1: Manage user and group accounts and associated system files

  • 1. useradd, userdel, passwd
    20m
  • 2. groupadd, groupdel, etc-group, getent
    6m

107.2: Automate system administration tasks by scheduling jobs

  • 1. cron, crontab
    19m
  • 2. cron.allow and cron.deny
    9m
  • 3. anacron and at
    15m
  • 4. systemctl and systemd-run
    9m

107.3: Localization and Internationalization

  • 1. Character codes, iconv
    14m
  • 2. locales, LANG, LC_*
    22m
  • 3. Time zones
    11m

108.1: Manage the system time

  • 1. date, hwclock
    17m
  • 2. ntpd, ntpdate, chrony
    26m

108.2: System logging

  • 1. syslog, rsyslog
    14m
  • 2. journalctl, logger, systemd-cat
    14m

108.3: Basics of Mail Transfer Agents (MTA)

  • 1. sendmail, postfix, mailq
    17m

108.4: Manage printers and printing processes

  • 1. CUPS, lpr, lpq, lpadmin, lpc
    20m

109.1: Basics of Internet Protocols

  • 1. OSI model, ports, address classes
    14m
  • 2. IPv4 addresses
    26m
  • 3. Subnet masks
    23m
  • 4. IPv6 addresses
    14m

109.2: Persistent network configuration

  • 1. nmcli
    18m
  • 2. ifup, ifdown, hostname, hostnamectl
    9m
  • 3. etc/hosts, /etc/resolv.conf, /etc/nsswitch.conf
    6m

109.3: Basic Network Troubleshooting

  • 1. ifconfig, hostname
    11m
  • 2. route, traceroute, tracepath
    18m
  • 3. netstat, nc
    12m
  • 4. ip
    8m

109.4: Configuring the client-side DNS

  • 1. nslookup, host, dig, getent
    10m

110.1: Perform security administration tasks

  • 1. find, chage, passwd, ulimit, lsof, fuser
    13m
  • 2. w, who, sudo, su, /etc/sudoers
    12m

110.2: Securing a computer

  • 1. etc/nologin, xinetd, systemd.socket
    17m

110.3: Protecting data with encryption

  • 1. ssh, scp
    18m
  • 2. ssh_conf, sshd_conf
    8m
  • 3. ssh-keygen, encryption methods
    16m
  • 4. Create and integrate new keys, ssh-agent
    9m
  • 5. GnuPG, gpg-agent
    17m