HAPPY BOOKSGIVING
Use code BOOKSGIVING during checkout to save 40%-55% on books and eBooks. Shop now.
Register your product to gain access to bonus material or receive a coupon.
This eBook includes the following formats, accessible from your Account page after purchase:
EPUB The open industry format known for its reflowable content and usability on supported mobile devices.
PDF The popular standard, used most often with the free Acrobat® Reader® software.
This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.
This eBook includes the following formats, accessible from your Account page after purchase:
EPUB The open industry format known for its reflowable content and usability on supported mobile devices.
PDF The popular standard, used most often with the free Acrobat® Reader® software.
This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.
For each exam objective, the key commands and configuration files will be detailed. The CompTIA Linux+ Portable Command Guide provides a single point of reference while studying for the certification exams as well as a valuable resource after the candidate has successfully passed the exams.
The guide summarizes all commands, keywords, command arguments, and associated prompts. Configuration examples are provided throughout the book to give a better understanding of how these commands are used. This guide is not meant to replace any existing learning materials but rather serve as a supplementary guide to assist readers in the proper use of the many different commands to use on a regular basis and that are required to successfully pass the exams.
Download the sample pages (includes Chapter 15)
Introduction xxx
Part I: Hardware and System Confi guration
CHAPTER 1 Explain Linux boot process concepts 1
Boot Loaders 1
Boot Options 3
File Locations 6
Boot Modules and Files 7
Kernel Panic 9
CHAPTER 2 Given a scenario, install, confi gure, and monitor kernel
modules 11
Commands 11
Files 15
CHAPTER 3 Given a scenario, confi gure and verify network connection parameters 17
Diagnostic Tools 18
Configuration Files 28
Bonding 34
CHAPTER 4 Given a scenario, manage storage in a Linux environment 37
Basic Partitions 38
Filesystem Hierarchy 40
Device Mapper 41
Tools 44
Location 54
Filesystem Types 58
CHAPTER 5 Compare and contrast cloud and virtualization concepts and technologies 59
Templates 60
Bootstrapping 62
Storage 63
Network Considerations 65
Types of Hypervisors 66
Tools 67
CHAPTER 6 Given a scenario, confi gure localization options 69
File Locations 70
Commands 70
Environment Variables 73
Character Sets 75
UTF-8 75
Part II: Systems Operation and Maintenance
CHAPTER 7 Given a scenario, conduct software installations, confi gurations, updates, and removals 77
Package Types 78
Installation Tools 78
Build Tools 86
Repositories 88
Acquisition Commands 89
CHAPTER 8 Given a scenario, manage users and groups 93
Creation 94
Modification 94
Deletion 96
Queries 96
Quotas 98
Profiles 102
Important Files and File Contents 106
CHAPTER 9 Given a scenario, create, modify, and redirect fi les 109
Text Editors 110
File Readers 114
Output Redirection 117
Text Processing 123
File and Directory Operations 129
Bonus: regex 141
CHAPTER 10 Given a scenario, manage services 143
Systemd Management 144
Systemd-analyze blame 148
Unit Files 148
SysVinit 152
CHAPTER 11 Summarize and explain server roles 157
NTP 158
SSH 158
Web 159
Certificate Authority 159
Name Server 159
DHCP 160
CHAPTER 12 Given a scenario, automate and schedule jobs 165
cron 165
at 165
crontab 167
fg 170
bg 171
& 171
kill 171
Ctrl-c 172
Ctrl-z 172
nohup 172
CHAPTER 13 Explain the use and operation of Linux devices 173
Types of Devices 174
Monitoring and Configuration Tools 176
File Locations 182
Hot Pluggable Devices 185
CHAPTER 14 Compare and Contrast Linux Graphical User Interfaces 187
Servers 187
GUI 188
Remote Desktop 189
Accessibility 192
Part III: Security
CHAPTER 15 Given a scenario, apply or acquire the appropriate user and/or group permissions and ownership 193
File and Directory Permissions 194
Context-Based Permissions 203
Privilege Escalation 209
User Types 211
CHAPTER 16 Given a scenario, confi gure and implement appropriate access and authentication methods 213
PAM 214
SSH 221
TTYs 228
PTYs 230
PKI 230
VPN as a Client 231
SSL/TLS 232
Transport Mode 232
Tunnel Mode 232
IPSec 232
DTLS 233
CHAPTER 17 Summarize security best practices in a Linux environment 235
Boot Security 236
Additional Authentication Methods 237
Multifactor Authentication 237
Importance of Disabling Root Login via SSH 239
Password-Less Login 239
Chroot Jail Services 240
No Shared IDs 240
Importance of Denying Hosts 240
Separation of OS Data from Application Data 241
Change Default Ports 241
Importance of Disabling or Uninstalling Unused and Unsecure Services 242
Importance of Enabling SSL/TLS 243
Importance of Enabling auditd 243
CVE Monitoring 243
Discouraging Use of USB Devices 243
Disk Encryption 244
Restrict cron Access 244
Disable Ctrl-Alt-Del 244
Add Banner 245
MOTD 245
CHAPTER 18 Given a scenario, implement logging services 247
Key File Locations 247
Log Management 249
CHAPTER 19 Given a scenario, implement and confi gure Linux fi rewalls 257
Access Control Lists 258
Technologies 259
IP Forwarding 263
Dynamic Rule Sets 263
Common Application 265
CHAPTER 20 Given a scenario, backup, restore, and compress fi les 267
Archive and Restore Utilities 268
Compression 269
Backup Types 272
Off-Site/Off-System Storage 274
Integrity Checks 275
Part IV: Linux Troubleshooting and Diagnostics
CHAPTER 21 Given a scenario, analyze system properties and remediate accordingly 277
Network Monitoring and Configuration 278
Storage Monitoring and Configuration 287
CPU Monitoring and Configuration 289
Memory Monitoring and Configuration 292
Lost Root Password 295
CHAPTER 22 Given a scenario, analyze system processes in order to optimize performance 297
Process Management 297
Process States 297
Priorities 298
Kill Signals 299
Commands 300
PIDs 305
CHAPTER 23 Given a scenario, analyze and troubleshoot user issues 307
Permissions 307
Access 309
Authentication 309
File Creation 310
Insufficient Privileges for Authorization 312
Environment and Shell Issues 312
CHAPTER 24 Given a scenario, analyze and troubleshoot application and hardware issues 313
SELinux Context Violations 314
Storage 314
Firewall 317
Permission 318
Service Accounts 319
Group Memberships 319
Dependencies 319
Troubleshooting Additional Hardware Issues 320
Part V: Automation and Scripting
CHAPTER 25 Given a scenario, deploy and execute basic BASH scripts 327
Shell Environments and Shell Variables 328
#!/ bin/bash 332
Sourcing Scripts 332
Directory and File Permissions 333
Extensions 333
Commenting 333
File Globbing 334
Shell Expansions 334
Redirection and Piping 336
Exit Codes 336
Metacharacters 336
Positional Parameters 337
Looping Constructs 337
Conditional Statements 338
Escaping Characters 340
CHAPTER 26 Given a scenario, carry out version control using Git 343
Arguments 343
Files 349
CHAPTER 27 Summarize orchestration processes and concepts 351
Agent 351
Agentless 352
Procedures 352
Attributes 352
Infrastructure Automation 352
Infrastructure as Code 352
Inventory 353
Automated Configuration Management 353
Build Automation 353
APPENDIX Create your own journal 355
9780135591840, TOC, 7/19/19