CompTIA Linux+ Portable Command Guide: All the commands for the CompTIA XK0-004 exam in one compact, portable resource, 2nd Edition

Book description

For each exam objective, the key commands and configuration files will be detailed. The CompTIA Linux+ Portable Command Guide provides a single point of reference while studying for the certification exams as well as a valuable resource after the candidate has successfully passed the exams.

 

The guide summarizes all commands, keywords, command arguments, and associated prompts. Configuration examples are provided throughout the book to give a better understanding of how these commands are used. This guide is not meant to replace any existing learning materials but rather serve as a supplementary guide to assist readers in the proper use of the many different commands to use on a regular basis and that are required to successfully pass the exams.

Table of contents

  1. Cover Page
  2. About This eBook
  3. Inside Front Cover
  4. Title Page
  5. Copyright Page
  6. Credits
  7. Contents at a Glance
  8. Table of Contents
  9. About the Author
  10. About the Technical Reviewer
  11. Dedications
  12. Acknowledgments
  13. We Want to Hear from You!
  14. Reader Services
  15. Introduction
    1. Who Should Read This Book
    2. Command Syntax Conventions
    3. Organization of This Book
    4. Did I Miss Anything?
  16. Part I: Hardware and System Configuration
    1. Chapter 1. Explain Linux boot process concepts
      1. Boot Loaders
      2. Boot Options
      3. File Locations
      4. Boot Modules and Files
      5. Kernel Panic
    2. Chapter 2. Given a scenario, install, configure, and monitor kernel modules
      1. Commands
      2. Files
    3. Chapter 3. Given a scenario, configure and verify network connection parameters
      1. Diagnostic Tools
      2. Configuration Files
      3. Bonding
    4. Chapter 4. Given a scenario, manage storage in a Linux environment
      1. Basic Partitions
      2. Filesystem Hierarchy
      3. Device Mapper
      4. Tools
      5. Location
      6. Filesystem Types
    5. Chapter 5. Compare and contrast cloud and virtualization concepts and technologies
      1. Templates
      2. Bootstrapping
      3. Storage
      4. Network Considerations
      5. Types of Hypervisors
      6. Tools
    6. Chapter 6. Given a scenario, configure localization options
      1. File Locations
      2. Commands
      3. Environment Variables
      4. Character Sets
  17. Part II: Systems Operation and Maintenance
    1. Chapter 7. Given a scenario, conduct software installations, configurations, updates, and removals
      1. Package Types
      2. Installation Tools
      3. Build Tools
      4. Repositories
      5. Acquisition Commands
    2. Chapter 8. Given a scenario, manage users and groups
      1. Creation
      2. Modification
      3. Deletion
      4. Queries
      5. Quotas
      6. Profiles
      7. Important Files and File Contents
    3. Chapter 9. Given a scenario, create, modify, and redirect files
      1. Text Editors
      2. File Readers
      3. Output Redirection
      4. Text Processing
      5. File and Directory Operations
      6. Bonus: regex
    4. Chapter 10. Given a scenario, manage services
      1. Systemd Management
      2. Systemd-analyze blame
      3. Unit Files
      4. SysVinit
    5. Chapter 11. Summarize and explain server roles
      1. NTP
      2. SSH
      3. Web
      4. Certificate Authority
      5. Name Server
      6. DHCP
      7. File Servers
      8. Authentication Server
      9. Proxy
      10. Logging
      11. Containers
      12. VPN
      13. Monitoring
      14. Database
      15. Print Server
      16. Mail Server
      17. Load Balancer
      18. Clustering
    6. Chapter 12. Given a scenario, automate and schedule jobs
      1. cron
      2. at
      3. crontab
      4. fg
      5. bg
      6. &
      7. kill
      8. Ctrl-c
      9. Ctrl-z
      10. nohup
    7. Chapter 13. Explain the use and operation of Linux devices
      1. Types of Devices
      2. Monitoring and Configuration Tools
      3. File Locations
      4. Hot Pluggable Devices
    8. Chapter 14. Compare and Contrast Linux Graphical User Interfaces
      1. Servers
      2. GUI
      3. Remote Desktop
      4. Console Redirection
      5. Accessibility
  18. Part III: Security
    1. Chapter 15. Given a scenario, apply or acquire the appropriate user and/or group permissions and ownership
      1. File and Directory Permissions
      2. Context-Based Permissions
      3. Privilege Escalation
      4. User Types
    2. Chapter 16. Given a scenario, configure and implement appropriate access and authentication methods
      1. PAM
      2. SSH
      3. TTYs
      4. PTYs
      5. PKI
      6. VPN as a Client
    3. Chapter 17. Summarize security best practices in a Linux environment
      1. Boot Security
      2. Additional Authentication Methods
      3. Importance of Disabling Root Login via SSH
      4. Passwordless Login
      5. Chroot Jail Services
      6. No Shared IDs
      7. Importance of Denying Hosts
      8. Separation of OS Data from Application Data
      9. Change Default Ports
      10. Importance of Disabling or Uninstalling Unused and Unsecure Services
      11. Importance of Enabling SSL/TLS
      12. Importance of Enabling auditd
      13. CVE Monitoring
      14. Discouraging Use of USB Devices
      15. Disk Encryption
      16. Restrict cron Access
      17. Disable Ctrl-Alt-Del
      18. Add Banner
      19. MOTD
    4. Chapter 18. Given a scenario, implement logging services
      1. Key File Locations
      2. Log Management
    5. Chapter 19. Given a scenario, implement and configure Linux firewalls
      1. Access Control Lists
      2. Technologies
      3. IP Forwarding
      4. Dynamic Rule Sets
      5. Common Application
    6. Chapter 20. Given a scenario, backup, restore, and compress files
      1. Archive and Restore Utilities
      2. Compression
      3. Backup Types
      4. Off-Site/Off-System Storage
      5. Integrity Checks
  19. Part IV: Linux Troubleshooting and Diagnostics
    1. Chapter 21. Given a scenario, analyze system properties and remediate accordingly
      1. Network Monitoring and Configuration
      2. Storage Monitoring and Configuration
      3. CPU Monitoring and Configuration
      4. Memory Monitoring and Configuration
      5. Lost Root Password
    2. Chapter 22. Given a scenario, analyze system processes in order to optimize performance
      1. Process Management
      2. Process States
      3. Priorities
      4. Kill Signals
      5. Commands
      6. PIDs
    3. Chapter 23. Given a scenario, analyze and troubleshoot user issues
      1. Permissions
      2. Access
      3. Authentication
      4. File Creation
      5. Insufficient Privileges for Authorization
      6. Environment and Shell Issues
    4. Chapter 24. Given a scenario, analyze and troubleshoot application and hardware issues
      1. SELinux Context Violations
      2. Storage
      3. Firewall
      4. Permission
      5. Dependencies
      6. Troubleshooting Additional Hardware Issues
  20. Part V: Automation and Scripting
    1. Chapter 25. Given a scenario, deploy and execute basic BASH scripts
      1. Shell Environments and Shell Variables
      2. #!/ bin/bash
      3. Sourcing Scripts
      4. Directory and File Permissions
      5. Extensions
      6. Commenting
      7. File Globbing
      8. Shell Expansions
      9. Redirection and Piping
      10. Exit Codes
      11. Metacharacters
      12. Positional Parameters
      13. Looping Constructs
      14. Conditional Statements
      15. Escaping Characters
    2. Chapter 26. Given a scenario, carry out version control using Git
      1. Arguments
      2. Files
    3. Chapter 27. Summarize orchestration processes and concepts
      1. Agent
      2. Agentless
      3. Procedures
      4. Attributes
      5. Infrastructure Automation
      6. Infrastructure as Code
      7. Inventory
      8. Automated Configuration Management
      9. Build Automation
  21. Appendix. Create Your Own Journal
  22. Index
  23. Code Snippets

Product information

  • Title: CompTIA Linux+ Portable Command Guide: All the commands for the CompTIA XK0-004 exam in one compact, portable resource, 2nd Edition
  • Author(s): William Bo Rothwell
  • Release date: September 2019
  • Publisher(s): Pearson IT Certification
  • ISBN: 9780135591949