Toggle menu
Introduction
LFCS
Domains and Competencies
1. Essential Commands
1.1 Identify the component of the Linux distribution that a file belongs to
1.2 Install Linux Distribution to physical media
1.3 Install Linux Distribution over a network
1.4 Install Linux Distribution into a virtual disk image
1.5 Log into graphical and text mode consoles
1.6 Search for files
1.7 Evaluate and compare file system features and options
1.8 Compare text files
1.9 Compare binary files
1.10 Identify different types of files
1.11 Create and edit text files
1.12 Use input-output redirection
1.13 Analyze text using basic regular expressions
1.14 Access remote systems securely using CLI
1.15 Archive, compress, unpack, and uncompress files
1.16 Create, delete, copy, and move files and directories
1.17 Create hard and soft links
1.18 List, set, and change standard file permissions
1.19 Read, and use system documentation
1.20 Manipulate file content programmatically
1.21 Transfer files securely via the network
1.22 Manage access to the root account
1.23 Perform disk image management
1.24 Use version control tools
1.25 Run commands on many systems simultaneously
2. Operation of Running Systems
2.1 Boot, reboot, and shut down a system safely
2.2 Boot systems into different runlevels manually
2.3 Install, configure and troubleshoot the bootloader
2.4 Manage shared libraries
2.5 Change the priority of a process
2.6 Identify resource utilization by process
2.7 Locate and analyze system log files
2.8 Schedule tasks to run at a set date and time
2.9 Verify completion of scheduled jobs
2.10 Manipulate Linux system during the boot process
2.11 Manipulate Linux system during the recovery process
2.12 Support incident management for outages/trouble
2.13 Identify and resolve system performance bottlenecks and platform instability
2.14 Update hardware to provide required functionality and security
2.15 Update operating systems to provide required functionality and security
2.16 Update software to provide required functionality and security
2.17 Update the kernel and ensure the system is bootable
2.18 Verify the integrity and availability of hardware
2.19 Verify the integrity and availability of resources
2.20 Verify the integrity and availability of key processes
2.21 Change kernel runtime parameters, persistent and non-persistent
2.22 Use scripting to automate system maintenance tasks
2.23 Manage the startup process and services
2.24 List and identify SELinux/AppArmor file and process contexts
2.25 Produce and deliver reports on system use
(processor, memory, disk, and network), outages, and user requests
2.26 Update packages from the network, a remote repository, or from the local file system
2.27 Configure and modify SELinux/AppArmor policies
2.28 Monitor security and conduct audits
2.29 Script automation tools to make work faster and more accurate
2.30 Develop and test disaster recovery plans
2.31 Maintain systems via configuration management tools
2.32 Train team members on new technology or changes to existing systems
2.33 Develop system disaster recovery tests
2.34 Install software from source
3. User and Group Management
3.1 Create, delete, and modify local user accounts
3.2 Create, delete, and modify local groups and group memberships
3.3 Manage system-wide environment profiles
3.4 Configure a client to use LDAP for user and group information
3.5 Configure a system to authenticate using Kerberos
3.6 Configure set-GID directories for collaboration
3.7 Manage template user environment
3.8 Configure user resource limits
3.9 Manage user processes
3.10 Configure PAM
4. Networking
4.1 Configure networking and hostname resolution statically or dynamically
4.2 Configure network services to start automatically at boot
4.3 Implement packet filtering
4.4 Configure firewall settings
4.5 Configure a system to perform Network Address Translation
4.6 Start, stop, and check the status of network services
4.7 Monitor network performance
4.8 Statically route IP traffic
4.9 Dynamically route IP traffic
4.10 Synchronize time using other network peers
4.11 Configure network traffic tunneling
5. Service Configuration
5.1 Configure a basic DNS server
5.2 Maintain a DNS zone
5.3 Configure a caching-only name server
5.4 Configure a caching-only name server to forward DNS queries
5.5 Configure an FTP server
5.6 Configure anonymous-only download on FTP servers
5.7 Provide/configure network shares via NFS
5.8 Provide/configure network shares via CIFS
5.9 Configure an smtp service
5.10 Restrict access to an smtp server
5.11 Configure a mail transfer agent (MTA) to accept inbound email from other systems
5.12 Configure an MTA to forward (relay) email through a smart host
5.13 Configure email aliases
5.14 Configure SSH servers and clients
5.15 Configure SSH-based remote access using public/private key pairs
5.15 Configure a DHCP server
5.16 Configure the HTTP proxy server
5.17 Restrict access to the HTTP proxy server
5.18 Configure an HTTP client to automatically use a proxy server
5.19 Configure an IMAP and IMAPS service
5.20 Configure host-based and user-based security for a service
5.21 Query and modify the behavior of system services at various run levels
5.22 Configure direct-attach and network printers
5.23 Configure an HTTP server
5.24 Configure HTTP server log files
5.25 Configure SSL with HTTP server
5.26 Set up name-based virtual web hosts
5.27 Deploy a basic web application
5.28 Restrict access to a web page
5.29 Configure time synchronization server
5.30 Synchronize time using other time synchronization peers
5.31 Configure a system to log to a remote system
5.32 Configure a PXE Boot server
5.33 Configure an LDAP server and schema
5.34 Configure a system to accept logging from a remote system
5.35 Diagnose routine SELinux/AppArmor policy violations
5.36 Configure SELinux/AppArmor to support a service
5.37 Configure database server
5.38 Configure SELinux/AppArmor to confine a service
6. Virtualization
6.1 Configure a hypervisor to host virtual guests
6.2 Install Linux systems as virtual guests
6.3 Start, stop, modify the status of virtual machines
6.4 Access a VM console
6.5 Migrate a VM between two hosts
6.6 Configure systems to launch virtual machines at boot
6.7 Evaluate memory usage of virtual machines
6.8 Create light-weight virtualized guests via namespaces
6.9 Resize RAM or storage of VMs
6.10 Cloning and replicating VMs using images or snapshots
7. Storage Management
7.1 List, create, delete, and modify storage partitions
7.2 Create, migrate, and remove Physical Volumes
7.3 Assign Physical Volumes to Volume Groups
7.4 Create, modify and delete Logical Volumes
7.5 Extend existing Logical Volumes and filesystems
7.6 Create and configure encrypted partitions
7.7 Configure systems to mount file systems at or during boot
7.8 Configure and manage swap space
7.9 Add new partitions, and logical volumes
7.10 Create, mount, and unmount standard Linux file systems
7.11 Assemble partitions as RAID devices
7.12 Identify storage devices using block device attributes
7.13 Configure systems to mount standard, encrypted, and network file systems on demand
7.14 Create and manage filesystem Access Control Lists (ACLs)
7.15 Diagnose and correct file permission problems
7.16 Setup user and group disk quotas for filesystems
7.17 Restore default SELinux file contexts
7.18 Manage Linux file system features and flags
7.19 Configure remote block storage devices
7.20 Design and test backup/recovery strategies
7.21 Deploy, configure, and maintain high availability/clustering/replication
LFCE
Domains and Competencies
1. Network administration
1.1 Configure network services to start automatically at boot
1.2 Implement packet filtering
1.3 Monitor network performance
1.4 Produce and deliver reports on system use, outages and user requests
1.5 Route IP traffic statically and dynamically
1.6 Troubleshoot network issues
2. Network filesystems and services
2.1 Configure systems to mount standard, encrypted and network file systems on demand
2.2 Create, mount and unmount standard Linux file systems
2.3 Provide/configure network shares via NFS
2.4 Transfer files securely via the network
2.5 Update packages from the network, a repository or the local file system
3. Network security
3.1 Configure Apache log files
3.2 Configure the firewall with iptables
3.3 Install and configure SSL with Apache
3.4 Configuring SSH-based remote access using public/private key pairs
4. Remote access
4.1 Configure the firewall with iptables
5. HTTP services
5.1 Configure an http client to automatically use a proxy server
5.2 Install and configure an Apache web server
5.3 Install and configure the Squid proxy server
5.4 Restrict access to a web page with Apache
5.5 Restrict access to the Squid proxy server
5.6 Setting up name-based virtual web hosts
6. Email services
6.1 Configure email aliases
6.2 Install and configure an IMAP and IMAPS service
6.3 Install and configure an smtp service
6.4 Restrict access to an smtp server
Reference
404 ERROR - PAGE NOT FOUND
The link you clicked may be broken or the page may have been removed.
VISIT THE
HOMEPAGE
OR
CONTACT US
ABOUT THE PROBLEM
All logos, trademarks and registered trademarks are the property of their respective owners.
All other materials on this website is licensed under a
Creative Commons Attribution 4.0 International License
.