Linux for Unix Administrators Training in Coconut Creek
 
                    Enroll in or hire us to teach our Linux for Unix Administrators class in Coconut Creek,  Florida by calling us @303.377.6176.  Like all HSG
                    classes, Linux for Unix Administrators may be offered either onsite or via instructor led virtual training.  Consider looking at our public training schedule to see if it
                    is scheduled:  Public Training Classes
                    
                
                        Provided there are enough attendees, Linux for Unix Administrators may be taught at one of our local training facilities.  
                    
                    | 
                	 We offer private customized training for groups of 3 or more attendees.
                 | ||
| Course Description | ||
| A fast paced 5-day course that is a combination of "Enterprise
Linux Systems Administration", and "Enterprise Linux
Networking Services. Particular focus is given to translating
Solaris and HP-UX skills to Linux. 
                        Course Length: 5 Days Course Tuition: $2250 (US) | ||
| Prerequisites | |
| A good understanding of network concepts, the TCP/I P protocol suite, and basic UNIX security is also assumed. | |
| Course Outline | 
| 
	LINUX ORIENTATION 
	FSF and GNU 
	GPL – General Public License 
	Linux Kernel and Versioning 
	Components of a Distribution 
	Red Hat Linux Products 
	SUSE Linux Products 
	LINUX KERNEL & HARDWARE 
	Hardware Discovery Tools 
	Configuring New Hardware with hwinfo 
	Hardware and System Clock 
	Console 
	Virtual Terminals 
	Keyboard & locale configuration 
	Serial Ports 
	SCSI Devices 
	USB Architecture 
	Defining a Printer 
	Tape Libraries 
	Managing Linux Device Files 
	Kernel Hardware Info – /sys/ 
	/sys/ Structure 
	udev 
	Kernel Modules 
	Configuring Kernel Components and Modules 
	Handling Module Dependencies 
	Configuring the Kernel via /proc/ 
	Random Numbers and /dev/random 
	System Tools 
	LAB TASKS 
	Adjusting Kernel Options 
	Linux Kernel Driver Compilation 
	Configuring Print Queues 
	Introduction to Troubleshooting Labs 
	Troubleshooting Practice: Kernel Modules 
	SYSTEMD OVERVIEW 
	System Boot Method Overview 
	systemd System and Service Manager 
	Modifying systemd services 
	Systemd Service Sandboxing Features 
	systemd Targets 
	Using systemd 
	Linux Runlevels Aliases 
	Legacy Support for SysV init 
	LAB TASKS 
	Managing Services With Systemd's systemctl 
	Creating a systemd unit file 
	GRUB2/SYSTEMD BOOT PROCESS 
	Booting Linux on PCs 
	GRUB 2 
	GRUB 2 Configuration 
	GRUB 2 Security 
	Boot Parameters 
	Initial RAM Filesystem 
	init 
	Systemd local-fs.target and sysinit.target 
	Systemd basic.target and multi-user.target 
	Legacy local bootup script support 
	System Configuration Files 
	RHEL7 Configuration Utilities 
	SLES12 Configuration Utilities 
	Shutdown and Reboot 
	LAB TASKS 
	Boot Process 
	Booting directly to a bash shell 
	GRUB Command Line 
	Basic GRUB Security 
	Troubleshooting Practice: Boot Process 
	SOFTWARE MAINTENANCE 
	RPM Architecture 
	Working With RPMs 
	Querying and Verifying with RPM 
	Updating the Kernel RPM 
	Using the Yum command 
	Using the Zypper command 
	YUM package groups 
	Zypper Services and Catalogs 
	Configuring Yum 
	YUM Repositories 
	Rebuilding Source RPM Packages 
	Software Tools Comparison Matrix 
	LAB TASKS 
	Managing Software with RPM 
	Creating a Custom RPM Repository 
	Querying the RPM Database 
	Installing Software via RPM & Source and Rebuilding SRPMs 
	Using Yum 
	Using Zypper 
	LOCAL STORAGE ADMINISTRATION 
	Partitioning Disks with fdisk & gdisk 
	Resizing a GPT Partition with gdisk 
	Partitioning Disks with parted 
	Non-Interactive Disk Partitioning with sfdisk 
	Filesystem Creation 
	Mounting Filesystems 
	Filesystem Maintenance 
	Resizing Filesystems 
	Managing an XFS Filesystem 
	Swap 
	Filesystem Attributes 
	Filesystem Creation and Management 
	LAB TASKS 
	Creating and Managing Filesystems 
	Hot Adding Swap 
	LVM & RAID 
	Logical Volume Management 
	Implementing LVM 
	Creating Logical Volumes 
	Activating LVM VGs 
	Exporting and Importing a VG 
	Examining LVM Components 
	Changing LVM Components 
	Advanced LVM Overview 
	Advanced LVM: Components & Object Tags 
	Advanced LVM: Automated Storage Tiering 
	Advanced LVM: Thin Provisioning 
	Advanced LVM: Striping & Mirroring 
	Advanced LVM: RAID Volumes 
	SLES Graphical Disk Tool 
	RAID Concepts 
	Array Creation with mdadm 
	Software RAID Monitoring 
	Software RAID Control and Display 
	LVM and RAID: Unix Tool Comparison 
	LAB TASKS 
	Creating and Managing LVM Volumes 
	Creating LVM Thin Volumes 
	Creating and Managing a RAID-5 Array 
	REMOTE STORAGE ADMINISTRATION 
	Remote Storage Overview 
	Remote Filesystem Protocols 
	Remote Block Device Protocols 
	NFS Clients 
	NFS Server Configuration 
	Implementing NFSv4 
	AutoFS 
	AutoFS Configuration 
	SAN Multipathing 
	Multipath Configuration 
	Multipathing Best Practices 
	iSCSI Architecture 
	Open-iSCSI Initiator Implementation 
	iSCSI Initiator Discovery 
	iSCSI Initiator Node Administration 
	Mounting iSCSI Targets at Boot 
	iSCSI Multipathing Considerations 
	LAB TASKS 
	Using autofs 
	NFS Server Configuration 
	iSCSI Initiator Configuration 
	USER/GROUP ADMINISTRATION 
	Approaches to Storing User Accounts 
	User and Group Concepts 
	User Administration 
	Modifying Accounts 
	Group Administration 
	Password Aging 
	Default User Files 
	Controlling Login Sessions 
	RHEL DS Client Configuration 
	SLES DS Client Configuration 
	PAM Overview 
	PAM Module Types 
	PAM Order of Processing 
	PAM Control Statements 
	pam_wheel.so 
	pam_limits.so 
	User/Group Administration Comparison Matrix 
	LAB TASKS 
	User and Group Administration 
	Using LDAP for Centralized User Accounts 
	Troubleshooting Practice: Account Management 
	Restricting superuser access to wheel group membership 
	Setting Limits with the pam_limits Modules 
	Using pam_limits to Restrict Simultaneous Logins 
	SECURITY ADMINISTRATION 
	Security Concepts 
	Tightening Default Security 
	Security Advisories 
	Fine Grained Authorizations with Polkit 
	File Access Control Lists 
	Manipulating FACLs 
	Viewing FACLs 
	Backing Up FACLs 
	File Creation Permissions with umask 
	User Private Group Scheme 
	Alternatives to UPG 
	TCP Wrappers Concepts 
	TCP Wrappers Concepts 
	Xinetd 
	SUSE Basic Firewall Configuration 
	Netfilter Concepts 
	Using the iptables Command 
	Common match_specs 
	Extended Packet Matching Modules 
	Connection Tracking 
	AppArmor 
	SELinux Security Framework 
	SELinux Modes 
	SELinux Commands 
	Choosing an SELinux Policy 
	SELinux Booleans 
	SELinux Policy Tools 
	(X)INETD and Firewalls 
	LAB TASKS 
	User Private Groups 
	Using Filesystem ACLs 
	Securing xinetd Services 
	Enforcing Security Policy with xinetd 
	Securing Services with TCP Wrappers 
	Securing Services with SuSEfirewall2 
	Securing Services with Netfilter 
	Exploring SELinux Modes 
	SELinux File Contexts 
	PROCESS ADMINISTRATION 
	at & cron Usage 
	Anacron 
	Viewing Processes 
	Managing Processes 
	Tuning Process Scheduling 
	Process Accounting 
	Setting Resource Limits via ulimit 
	LAB TASKS 
	Creating and Managing User Cron Jobs 
	Adding System cron Jobs 
	NETWORKING 
	Linux Network Interfaces 
	Ethernet Hardware Tools 
	Network Configuration with ip Command 
	Configuring Routing Tables 
	IP to MAC Address Mapping with ARP 
	Starting and Stopping Interfaces 
	NetworkManager 
	DNS Clients 
	DHCP Clients 
	Network Diagnostics 
	Information from ss and netstat 
	Managing Network-Wide Time 
	Continual Time Sync with NTP 
	Configuring NTP Clients 
	Multiple IP Addresses 
	IPv6 
	Interface Aggregation 
	Interface Bonding 
	Network Teaming 
	Interface Bridging 
	802.1q VLANS 
	Network Configuration Tools 
	LAB TASKS 
	Network Discovery 
	Basic Client Networking 
	NTP Client Configuration 
	Multiple IP Addresses Per Network Interface 
	Configuring IPv6 
	Troubleshooting Practice: Networking 
	MONITORING & TROUBLESHOOTING 
	System Status – Memory 
	System Status – I/O 
	System Status – CPU 
	Performance Trending with sar 
	Troubleshooting Basics: The Process 
	Troubleshooting Basics: The Tools 
	System Logging 
	Syslog-ng 
	systemd Journal 
	systemd Journal's journalctl 
	Secure Logging with Journal's Log Sealing 
	Rsyslog 
	/etc/rsyslog.conf 
	Log Management 
	Log Anomaly Detector 
	strace and ltrace 
	Troubleshooting Incorrect File Permissions 
	Inability to Boot 
	Typos in Configuration Files 
	Corrupt Filesystems 
	RHEL7 Rescue Environment 
	SUSE Rescue Environment 
	Process Tools 
	LAB TASKS 
	Using the systemd Journal 
	Setting up a Full Debug Logfile 
	Remote Syslog Configuration 
	Remote Rsyslog TLS Configuration 
	Recovering Damaged MBR 
	BIND DNS 
	The Domain Name Space 
	Delegation and Zones 
	Server Roles 
	Resolving Names 
	Resolving IP Addresses 
	Basic BIND Administration 
	Configuring the Resolver 
	Testing Resolution 
	rndc Key Configuration 
	named.conf Options Block 
	Creating a Site-Wide Cache 
	Zones In named.conf 
	Zone Database File Syntax 
	SOA – Start of Authority 
	A, AAAA, & PTR – Address & Pointer Records 
	NS – Name Server 
	TXT, CNAME, & MX – Text, Alias, & Mail Host 
	Abbreviations and Gotchas 
	$GENERATE, $ORIGIN, and $INCLUDE 
	LAB TASKS 
	Configuring a Slave Name Server 
	Use rndc to Control named 
	Configuring BIND Zone Files 
	SQL FUNDAMENTALS AND MARIADB 
	Popular SQL Databases 
	SELECT Statements 
	INSERT Statements 
	UPDATE Statements 
	DELETE Statements 
	JOIN Clauses 
	MariaDB 
	MariaDB Installation and Security 
	MariaDB User Account Management 
	MariaDB Replication 
	LAB TASKS 
	SQL with Sqlite3 
	Installing and Securing MariaDB 
	Creating a Database in MariaDB 
	Create a Database Backed Application 
	OPENLDAP 
	OpenLDAP: Server Architecture 
	OpenLDAP: Backends 
	OpenLDAP: Replication 
	OpenLDAP: Configuration Options 
	OpenLDAP Server Tools 
	OpenLDAP Client Tools 
	LDIF: LDAP Data Interchange Format 
	Enabling LDAP-based Login 
	System Security Services Daemon (SSSD) 
	LAB TASKS 
	Building An OpenLDAP Server 
	Enabling TLS For An OpenLDAP Server 
	Enabling LDAP-based Logins 
	VSFTPD & APACHE 
	vsftpd 
	Anonymous FTP with vsftpd 
	Configuring vsftpd 
	HTTP Operation 
	Apache Architecture 
	Apache Configuration Files 
	httpd.conf – Server Settings 
	httpd.conf – Main Configuration 
	httpd.conf – VirtualHost Configuration 
	Virtual Hosting DNS Implications 
	Adding Modules to Apache 
	Apache Logging 
	Delegating Administration 
	Directory Protection 
	Directory Protection with AllowOverride 
	Common Uses for .htaccess 
	TLS Using mod_ssl.so 
	LAB TASKS 
	Configuring vsftpd 
	Apache Architecture 
	Apache Content 
	Configuring Virtual Hosts 
	Using .htaccess Files 
	Using TLS Certificates with Apache 
	SQUID PROXY SERVER 
	Squid Overview 
	Squid File Layout 
	Squid Access Control Lists 
	Applying Squid ACLs 
	Tuning Squid & Configuring Cache Hierarchies 
	Bandwidth Metering 
	Monitoring Squid 
	Proxy Client Configuration 
	LAB TASKS 
	Installing and Configuring Squid 
	Squid Cache Manager CGI 
	Proxy Auto Configuration 
	Configure a Squid Proxy Cluster 
	SAMBA 
	Samba Daemons 
	Accessing Windows/Samba Shares from Linux 
	Samba Utilities 
	Samba Configuration Files 
	The smb.conf File 
	Mapping Permissions and ACLs 
	Mapping Linux Concepts 
	Sharing Home Directories 
	Sharing Printers 
	Share Authentication 
	User-Level Access 
	Mapping Users 
	Samba Account Database 
	User Share Restrictions 
	LAB TASKS 
	Samba Share-Level Access 
	Samba User-Level Access 
	Samba Group Shares 
	Handling Symbolic Links with Samba 
	Samba Home Directory Shares 
	POSTFIX 
	Postfix Features 
	Postfix Components 
	Postfix Configuration 
	master.cf 
	main.cf 
	Postfix Map Types 
	Postfix Pattern Matching 
	Virtual Domains 
	Postfix Mail Filtering 
	Configuration Commands 
	Management Commands 
	SMTP AUTH Server and Relay Control 
	SMTP AUTH Clients 
	TLS Server Configuration 
	Postfix Client Configuration for TLS 
	LAB TASKS 
	Configuring Postfix 
	Postfix Network Configuration 
	Postfix Virtual Host Configuration 
	Postfix SMTP AUTH Configuration 
	Postfix STARTTLS Configuration 
	SUSE Postfix Configuration Cleanup 
	EMAIL SERVICES 
	Procmail 
	SpamAssassin 
	amavisd-new Mail Filtering 
	Cyrus IMAP/POP3 Server 
	Cyrus IMAP MTA Integration 
	Cyrus Mailbox Administration 
	Dovecot POP3/IMAP Server 
	LAB TASKS 
	Configuring Procmail & SpamAssassin 
	Configuring Cyrus IMAP 
	Dovecot TLS Configuration 
	INSTALLING RHEL7 
	Anaconda: An Overview 
	Anaconda: Booting the System 
	Anaconda: Common Boot Options 
	Anaconda: Loading Anaconda and Packages 
	Anaconda: Storage Options 
	Anaconda: Troubleshooting 
	FirstBoot 
	Kickstart 
	Network Booting with PXE 
	A Typical Install 
	LAB TASKS 
	Linux Installation 
	Automating Installation with Kickstart 
	INSTALLING SLES12 
	YaST Install Program Interface 
	Network Installation 
	SLP for SUSE Linux Installation 
	Installation Choices 
	Kernel Crash Dump Configuration 
	Network Booting with PXE 
	Creating AutoYaST2 Files 
	Using AutoYaST2 files 
	linuxrc Automation 
	Installation Diagnostics 
	After The First Reboot 
	A Typical Install 
	LAB TASKS 
	SUSE Linux Enterprise Server Installation 
	Automating Installation with AutoYaST | 
Course Directory [training on all levels]
Technical Training Courses
                                Software engineer/architect, System Admin ... Welcome!
                            - .NET Classes
- Agile/Scrum Classes
- AI Classes
- Ajax Classes
- Android and iPhone Programming Classes
- Azure Classes
- Blaze Advisor Classes
- C Programming Classes
- C# Programming Classes
- C++ Programming Classes
- Cisco Classes
- Cloud Classes
- CompTIA Classes
- Crystal Reports Classes
- Data Classes
- Design Patterns Classes
- DevOps Classes
- Foundations of Web Design & Web Authoring Classes
- Git, Jira, Wicket, Gradle, Tableau Classes
- IBM Classes
- Java Programming Classes
- JBoss Administration Classes
- JUnit, TDD, CPTC, Web Penetration Classes
- Linux Unix Classes
- Machine Learning Classes
- Microsoft Classes
- Microsoft Development Classes
- Microsoft SQL Server Classes
- Microsoft Team Foundation Server Classes
- Microsoft Windows Server Classes
- Oracle, MySQL, Cassandra, Hadoop Database Classes
- Perl Programming Classes
- Python Programming Classes
- Ruby Programming Classes
- SAS Classes
- Security Classes
- SharePoint Classes
- SOA Classes
- Tcl, Awk, Bash, Shell Classes
- UML Classes
- VMWare Classes
- Web Development Classes
- Web Services Classes
- Weblogic Administration Classes
- XML Classes
Business Training Courses
                                Project Managers, Business Analysts, Paralegals ... Welcome!
                            Upcoming Classes
                    Gain insight and ideas from students with different perspectives and experiences.
                    - Object-Oriented Programming in C# Rev. 6.1 
 17 November, 2025 - 21 November, 2025
- RHCSA EXAM PREP 
 17 November, 2025 - 21 November, 2025
- Python for Scientists 
 8 December, 2025 - 12 December, 2025
- RED HAT ENTERPRISE LINUX SYSTEMS ADMIN I 
 3 November, 2025 - 7 November, 2025
- ASP.NET Core MVC (VS2022) 
 24 November, 2025 - 25 November, 2025
- See our complete public course listing 
Linux Unix Uses & Stats
Linux Unix is Used For:
	            			Desktop
	            			Mainframe  Computers
	            			Mobile Devices
	            			Embedded Devices
	            		| Difficulty | Popularity | Year Created1991/1971 | 
| Pros 
	Performance: 
	Linux supports many efficient tools and operates them seamlessly. Because it's architecture is lightweight it runs faster than both Windows 8.1 and 10.  
	Security: 
	Because Linux is an open-source software,  anyone can contribute code to help enhance the users’ experience i.e., adding features, fixing bugs, reducing security risks, and more. 
	Software Development: 
	The terminal in Linux is a *wild card*. You can do almost anything with it. This includes software installation, application and server configurations, file system management, and etc. 
	Large-scale: 
	Open-source projects benefit from having an attentive community. As a result, Linux is more secure than Windows. Instead of installing anti viruses to clean malware, you just have to stick to the recommended repositories.  
	Efficient:  
	Developers have the convenience of running servers, training machine learning models, accessing remote machines, and compiling and running scripts from the same terminal window.  
	Free:  
	Linux is free (you can put it on as many systems as you like) and you can change it to suit your needs. | Cons 
	Learning Curve:  
	Linux is not for everyone, there is a learning curve in switching to Ubuntu. To actually learn Linux efficiently would take a user one to several years. 
	No Tech Support: 
	Unlike Windows, there isn’t a dedicated tech support, so getting help for things is up to you.  
	Designer Compatabilty: 
	Linux is not as user friendly as Windows or as ‘straight out of the box design’ As an example for design choices, Adobe hasn’t released any of its products to Linux users. So it’s impossible to run them directly. The Ubuntu alternative is a free software called GIMP.  
	Gaming Capabilities:  
	Most games aren’t available in Linux. But that’s not to say you can’t make it happen, it's just not as easy.    | 
| Linux Unix Job Market | 
|   Average Salary |   Job Count |   Top Job Locations 
	New York City | 
| Complimentary Skills to have along with Linux Unix 
	The following are types of jobs that may require Linux skills.  The top 15 job titles on Dice.com that mention Linux in their postings are: 
	- DevOps Engineer - Software Engineer - Java Developer - Systems Engineer - Systems Administrator - Senior Software Engineer - Network Engineer - Python Developer - Linux Systems Administrator - Software Developer - System Administrator - Linux Administrator - Linux Engineer - Senior Java Developer - C++ Developer | 






