CompTIA Linux+

The new CompTIA Linux+ is for the IT pro who will use Linux to manage everything from cars and smartphones to servers and supercomputers, as a vast number of enterprises use Linux in cloud, cybersecurity, mobile and web administration applications. In the new CompTIA Linux+, candidates are only required to pass one exam for certification. However, the new certification is no longer eligible for the LPI 2-for-1 offer.

  • CompTIA Linux+ is the only job-focused Linux certification covering the latest foundational skills demanded by hiring managers.
  • Unlike other certifications, the new exam includes performance-based and multiple-choice questions to identify the employees who can do the job.
  • The exam covers tasks associated with all major distributions of Linux, setting the foundation for advanced vendor/distro-specific knowledge.

CompTIA Linux+ covers common tasks in major distributions of Linux, including the Linux command line, basic maintenance, installing and configuring workstations, and networking.

Kurikulum Kursus

  • Modul 1

    Performing Basic Linux Tasks

    • ORIENTATION TO THE CLASSROOM ENVIRONMENT Preview
    • Identify the Linux Design Philosophy
    • Free Software vs. Open Source Software
    • The GNU Project
    • The Linux Operating System Family
    • Linux Distributions
    • Uses for Linux
    • The CLI
    • Shells
    • Bash Syntax
    • Basic Bash Commands
    • File Editing Commands
    • Superuser Commands
    • Shell Tips and Tricks
    • Get Help with Linux
    • Manual Pages
    • Other Built-In Help Options
    • Interactive Help
    • Kuis 01
  • Modul 2

    Managing Users and Groups

    • Assume Superuser Privileges
    • Superuser
    • THE sudo COMMAND
    • THE visudo COMMAND
    • Create, Modify, and Delete Users
    • THE passwd COMMAND
    • THE /etc/shadow FILE
    • THE usermod COMMAND
    • Create, Modify, and Delete Groups
    • THE groupadd COMMAND
    • Query Users and Groups
    • THE who COMMAND
    • Configure Account Profiles
    • THE .bash_profile FILE
    • THE /etc/profile.d/ DIRECTORY
    • Lab 02A - Create User
    • Lab 02B - Change Password
    • Lab 02C - Add user to sudoers
    • kuis 02
  • Modul 3

    Managing Permissions and Ownership

    • Modify File and Directory Permissions
    • Permission Contexts
    • chmod SYMBOLIC MODE
    • chmod ABSOLUTE MODE
    • Default Permissions
    • Modify File and Directory Ownership
    • Configure Special Permissions and Attributes
    • SUID and SGID Permissions
    • Sticky Bit
    • THE lsattr COMMAND
    • Access Control Lists
    • Troubleshoot Permissions Issues
    • Permissions Troubleshooting
    • Ownership Troubleshooting
    • Group Membership Troubleshooting
    • Lab 03A - Change Permission
    • Lab 03B - Change Owner
    • kuis 03
  • Modul 4

    Managing Storage

    • Create Partitions
    • File Systems
    • Inodes
    • Virtual File System
    • Partitions
    • THE fdisk UTILITY
    • GNU Parted
    • THE partprobe COMMAND
    • THE fstab FILE
    • THE /dev/ DIRECTORY
    • Manage Logical Volumes
    • Logical Volume Manager
    • LVM Tools
    • Mount File Systems
    • mount OPTIONS
    • Manage File Systems
    • THE lsblk COMMAND
    • THE fsck COMMAND
    • THE tune2fs COMMAND
    • THE dumpe2fs COMMAND
    • Navigate the Linux Directory Structure
    • Standard Directories
    • The Home Directory
    • Absolute vs. Relative Paths
    • Troubleshoot Storage Issues
    • Storage Space Tracking
    • THE iostat COMMAND
    • THE ioping COMMAND
    • Storage Quotas
    • Additional Storage Troubleshooting Techniques
    • kuis 04
  • Modul 5

    Managing Files and Directories

    • Create and Edit Text Files
    • Vim
    • Switch Modes
    • Motions
    • GNU nano
    • nano SHORTCUTS
    • THE gedit TEXT EDITOR
    • Search for Files
    • THE find COMMAND
    • THE which and whereis COMMAND
    • Perform Operations on Files and Directories
    • THE less AND more COMMANDS
    • THE cp, mv and touch COMMAND
    • THE rm, ls, mkdir and mkdir COMMAND
    • Process Text Files
    • THE wc and sort COMMAND
    • THE cut and paste COMMAND
    • THE diff COMMAND
    • THE grep COMMAND
    • THE awk COMMAND
    • THE sed and ln COMMAND
    • Types of Links
    • Manipulate File Output
    • Input/Output Redirection and Redirection Operators
    • Piping AND THE xargs COMMAND
    • THE tee COMMAND
    • Lab 05A - Creating Directory
    • Lab 05B - Creating File
    • Lab 05C - Move File
    • Lab 05D - Copy File
    • Lab 05E - Remove File
    • Lab 05F - Redirection Output
    • kuis 05
  • Modul 6

    Managing Kernel Modules

    • Explore the Linux Kernel
    • The Linux Kernel
    • Kernel Layers
    • Install and Configure Kernel Modules
    • Kernel Module Management Commands
    • THE depmod COMMAND
    • Kernel Module Configuration
    • Kernel Parameters
    • Monitor Kernel Modules
    • THE dmesg COMMAND
    • kuis 06
  • Modul 7

    Managing the Linux Boot Process

    • Configure Linux Boot Components
    • BIOS and UEFI
    • Additional Boot Options
    • Sectors, MBR, and GPT
    • initrd
    • THE /boot/ DIRECTORY and The Boot Process
    • Kernel Panic
    • Configure GRUB 2
    • GRUB 2 Installation
    • THE /etc/grub.d/ DIRECTORY and GRUB 2 Boot Menu Customization
    • THE /etc/default/grub FILE and THE grub2-mkconfig COMMAND
    • kuis 07
  • Modul 8

    Managing System Components

    • Configure Localization Options
    • THE date COMMAND
    • THE timedatectl COMMAND
    • THE hwclock COMMAND
    • THE localectl COMMAND and Character Sets and Encoding
    • Configure GUIs
    • The X Window System, X.Org Server, and
    • X vs. Wayland
    • Desktop Environment
    • Remote Desktop
    • Console Redirection and SSH Port Forwarding
    • Accessibility Options
    • Manage Services
    • THE systemd SUITE and systemd UNIT FILES
    • systemd TARGETS
    • THE systemctl COMMAND
    • Example of Switching Targets
    • SysVinit and Runlevels
    • THE telinit AND runlevel COMMANDS
    • THE chkconfig COMMAND
    • Troubleshoot Process Issues
    • THE pgrep AND ps COMMAND
    • THE top COMMAND
    • THE systemd-analyze and lsof COMMAND
    • Process Priorities and nice, renice COMMAND
    • Foreground and Background Processes
    • Kill Commands
    • Kill Signals
    • Guidelines for Troubleshooting Process Issues
    • Troubleshoot CPU and Memory Issues
    • THE uptime and sar COMMAND
    • Common Memory Issues
    • THE free COMMAND
    • THE vmstat COMMAND
    • OOM Killer
    • Swap Space Configuration
    • Guidelines for Troubleshooting CPU and Memory Issues
    • Lab 08A - Change Timezone
    • Lab 08B - Change Hostname
    • kuis 08
  • Modul 9

    Managing Devices

    • Identify the Types of Linux Devices
    • Wireless , Video, Audio, And Printers Devices
    • Network Adapters, GPIO, And SATA
    • SCSI, HBA, And PCI
    • Configure Devices
    • udev
    • THE udevadm COMMAND
    • Printing Software, CUPS And THE lpr COMMAND
    • Monitor Devices
    • THE lspci, lpq COMMAND And Additional Device Monitoring Tools
    • Troubleshoot Hardware Issues
    • Printer Issues, Memory Issues And Video Issues
    • Storage Adapter Issues
    • THE lshw And dmidecode COMMAND
    • ABRT And Guidelines for Troubleshooting Hardware Issues
    • kuis 09
  • Modul 10

    Managing Networking

    • Identify TCP/IP Fundamentals
    • TCP/IP Layers, Network Identities, Network Devices and Components
    • DNS, DHCP, And IPv4 Addressing
    • IPv4 Classes
    • IPv6, Network Ports, And Network Segments
    • Identify Linux Server Roles
    • Web Services, Certificate Authority Services, And Name Server/DNS Services
    • DHCP Services, SNMP Services, And Authentication Services
    • Proxy Services, Logging Services, And Monitoring Services
    • Load Balancing Services, Clustering Services, And File/Print Services
    • Database Services, VPN Services, And Virtualization/Container Host Services
    • Email Services
    • Connect to a Network
    • THE nmcli COMMAND
    • THE nmtui And nmgui UTILITY
    • THE ifconfig And Ip COMMAND
    • THE iwconfig COMMAND
    • THE ethtool And brctl COMMAND
    • NIC Bonding
    • THE /etc/sysconfig/network-scripts/ DIRECTORY
    • THE /etc/sysconfig/network FILE
    • Configure DHCP and DNS Client Services
    • The DHCP Lease Generation and Renewal Process
    • Name Resolution
    • THE /etc/resolv.conf, /etc/nsswitch.conf FILE
    • Configure Cloud and Virtualization Technologies
    • Cloud Models
    • Cloud and Virtualization
    • Templates
    • Bootstrapping And Storage
    • Blob, Block Storage
    • Virtualization Tools
    • Troubleshoot Networking Issues
    • THE ping COMMAND
    • THE traceroute AND tracepath COMMANDS
    • THE netstat COMMAND
    • THE ss COMMAND
    • THE dig, nslookup, host, AND ip COMMANDS
    • THE route COMMAND
    • THE nmap COMMAND
    • Wireshark
    • THE tcpdump COMMAND
    • THE netcat And iftop COMMAND
    • THE iperf And mtr COMMAND
    • THE arp COMMAND
    • Guidelines for Troubleshooting Networking Issues
    • Lab 10A - Configure IP Address
    • kuis 10
  • Modul 11

    Managing Packages and Software

    • Identify Package Managers
    • Red Hat Installation vs. Debian Installation vs. Compiling
    • Package Managers
    • Manage RPM Packages with YUM
    • THE rpm COMMAND
    • THE yum COMMAND
    • Manage Debian Packages with APT
    • THE apt COMMAND
    • Configure Repositories
    • YUM Repository Configuration
    • APT Repository Configuration
    • Acquire Software
    • THE wget AND curl COMMANDS
    • .tar FILES And tar COMMAND OPTIONS
    • Build Software from Source Code
    • THE ldd COMMAND And The Software Compilation Process
    • Troubleshoot Software Dependency Issues
    • Guidelines for Troubleshooting Software Dependency Issues
    • Lab 11A - Installing Package
    • Lab 11B - Download File From Internet
    • Lab 11C - Compress File
    • kuis 11
  • Modul 12

    Securing Linux Systems

    • Implement Cybersecurity Best Practices
    • The CIA Triad
    • Authentication Methods
    • Multi-Factor Authentication And Privilege Escalation
    • chroot JAIL
    • Encryption
    • LUKS And THE cryptsetup COMMAND
    • Hashing
    • Networking Security Best Practices
    • User Access Security Best Practices
    • Additional Security Best Practices
    • Guidelines for Implementing Cybersecurity Best Practices
    • Implement Identity and Access Management Methods
    • SSH Authentication
    • THE sshd_config FILE
    • PAM
    • TTY Security
    • PKI
    • OpenSSL
    • VPNs AND IPSEC
    • VPNs AND SSL/TLS
    • Access and Authentication Troubleshooting
    • Configure SELinux or AppArmor
    • SELinux Contexts
    • SELinux Modes, SELinux Policies, And SELinux Commands
    • SELinux Violations
    • AppArmor
    • Configure Firewalls
    • THE iptables TOOL
    • UFW
    • THE firewalld SERVICE
    • firewall-cmd COMMAND EXAMPLES
    • Netfilter And IP Forwarding
    • IP Sets
    • Firewall Configuration for Applications
    • IPSs, DenyHosts, and Fail2ban
    • Implement Logging Services
    • Log Rotation
    • THE /etc/rsyslog.conf FILE
    • THE journalctl COMMAND
    • THE last COMMAND
    • Back Up, Restore, and Verify Data
    • Backup Types
    • THE tar COMMAND
    • THE cpio COMMAND
    • THE dd COMMAND
    • THE mirrorvg COMMAND, Off-Site Backup, And Data Transfer Tools
    • Compression And THE gzip COMMAND
    • THE xz COMMAND And THE bzip2 SUITE
    • THE zip COMMAND
    • Integrity Checking And Hash Functions
    • THE md5sum And SHA COMMAND
    • Lab 12A - Block Port with Iptables
    • Lab 12B - Check Integrity with md5sum
    • kuis 12
  • Modul 13

    Working with Bash Scripts

    • Customize the Bash Shell Environment
    • Variables
    • Environment Variables
    • THE export And env COMMAND
    • Search Paths, HISTFILESIZE And THE alias COMMAND
    • THE time COMMAND And Environment and Shell Troubleshooting
    • Identify Scripting and Programming Fundamentals
    • Variable
    • Common Operators
    • String Literals And
    • Arrays And Functions
    • Comments
    • Write and Execute a Simple Bash Script
    • Metacharacters
    • Exit Codes
    • Redirection and Piping
    • Shell Expansion
    • Substitution
    • Globbing
    • THE exec And source COMMAND
    • Script File Extensions And Script Permissions
    • Incorporate Control Statements in Bash Scripts
    • THE if STATEMENT
    • THE if…else STATEMENT
    • THE case STATEMENT
    • Loops
    • THE until And for LOOP
    • kuis 13
  • Modul 14

    Automating Tasks

    • Schedule Jobs
    • THE at COMMAND
    • Cron Jobs
    • THE crontab FILES And Cron Directories
    • Implement Version Control Using Git
    • git SUBCOMMANDS
    • Example Git Process for Local Repositories
    • Example Git Process for Collaboration And Git Files
    • Identify Orchestration Concepts
    • Infrastructure as Code And
    • Procedures, Attributes, Inventory Management, And Automated Configuration Management
    • Lab 14 - Automating Task with Cron
    • kuis 14
  • Modul 15

    Performing Linux Security Assessment

    • Assess Organizational Security with Network Reconnaissance Tools
    • ipconfig, ping, and ARP
    • route and traceroute
    • IP Scanners and Nmap
    • Service Discovery and Nmap
    • netstat and nslookup
    • Other Reconnaissance and Discovery Tools
    • Packet Capture and tcpdump
    • Packet Analysis and Wireshark
    • Packet Injection and Replay
    • Exploitation Frameworks
    • Netcat
    • Explain Security Concerns with General Vulnerability Types
    • Zero-day and Legacy Platform Vulnerabilities
    • Weak Host Configurations
    • Weak Network Configurations
    • Impacts from Vulnerabilities
    • Summarize Vulnerability Scanning Techniques
    • Vulnerability Scan Types
    • Common Vulnerabilities and Exposures
    • Intrusive versus Non-intrusive Scanning
    • Credentialed versus Non-Credentialed Scanning
    • False Positives, False Negatives, and Log Review
    • Explain Penetration Testing Concepts
    • Rules of Engagement
    • Exercise Types
    • Passive and Active Reconnaissance
    • Pen Test Attack Life Cycle
  • Modul 16

    Implementing Authentication Controls

    • Summarize Authentication Design Concepts
    • Identity and Access Management
    • Authentication Factors
    • Authentication Design
    • Multifactor Authentication
    • Authentication Attributes
    • Implement Knowledge-Based Authentication
    • Local, Network, and Remote Authentication
    • PAP, CHAP, and MS-CHAP Authentication
    • Password Attacks
    • Brute Force and Dictionary Attacks
    • Password Crackers
    • Authentication Management
    • Extensible Authentication Protocol/IEEE 802.1X
    • Remote Authentication Dial-in User Service
    • Open Authentication
    • kuis 16

Reviews (129)

4.8

Course Rating

MUHAMMAD KHUZAIN

8 April 2022, 11.13

baik

TRIO AGUNG PURWANTO

7 April 2022, 20.48

klo bisa semuanya dibikin automisasi semua, dari absen dll.

Priya Rizqi Pangestu

7 April 2022, 20.38

materinya bagus dan lumayan jelas untuk pemula

RIZKI AIBAR

7 April 2022, 20.09

Keren dan mudah dipahami

Nanda Adisaputra

7 April 2022, 13.53

Kesan : Mengandalkan ilmu kuliah saja, tidak cukup. Dengan ilmu yang Saya dapatkan lewat kursus dari Program Fresh Graduate Academy Digital Talent Scholarship (FGA DTS) ini , Saya jadi bisa lebih mendalami Sistem Operasi Linux yang materi dasarnya sudah didapatkan di perkuliahan. Semoga setelah ini Saya bisa lolos seleksi dan berkesempatan untuk mempelajari modul CyberSecurity. Amin Saran : Sebaiknya modulnya di update menggunakan bahasa Indonesia agar lebih mudah dan cepat dipahami. Kemudian untuk pengembangan course bisa ditambahkan fitur diskusi bareng mentor dan fasilitator di website nya untuk tanya jawab, seperti Stack Overflow.


Level Pemula
testing modul linux
31 Agu 2022 - 7 Okt. 2022

Kategori

linux security

Didukung oleh