توضیحات

75 ساعت
آنلاین
شروع 23 آذر ماه
پنجشنبه ها ساعت 11 تا 4 بعد از ظهر
ضبط میشود

ورود و دسترسی به دوره

پس از ثبت نام از طریق زیر میتوانید وارد دوره شوید:

ورود به کلاس آنلاین

از طریق اسکای روم

خصوصی
محتوای این درس فقط به خریداران نمایش داده میشود . برای دسترسی کامل به محتوای دوره آن را خریداری کنید.
ورود به جلسات ضبط شده

از طریق اسپات پلیر

خصوصی
محتوای این درس فقط به خریداران نمایش داده میشود . برای دسترسی کامل به محتوای دوره آن را خریداری کنید.
گروه تلگرام

ویژه دانشجویان دوره

خصوصی
محتوای این درس فقط به خریداران نمایش داده میشود . برای دسترسی کامل به محتوای دوره آن را خریداری کنید.
دانلود فایل ها

دانلود فایل جلسات

خصوصی
محتوای این درس فقط به خریداران نمایش داده میشود . برای دسترسی کامل به محتوای دوره آن را خریداری کنید.

تقویم آموزشی

نام دوره

ساعت

روز ها

زمان دوره

Linux for devops

11 الی 16

پنجشنبه ها

75 ساعت

Lpic 1

Determine and configure hardware settings:
  • Gather information about the system.
  • Configure kernel modules.
Boot the system:
  • Provide common boot options to the kernel.
  • Manage system startup.
Change runlevels and shutdown or reboot system:
  • Set the default runlevel.
  • Change between runlevels.
  • Shutdown and reboot the systeInstall a boot manager
Install and configure a boot loader (e.g., GRUB).
Package management
  • RPM Architecture
  • Working With RPMs
  • Querying and Verifying with rpm
  • Installing Debian Packages
  • Querying and Verifying with dpkg
  • The alien Package Conversion Tool
  • Managing Software Dependencies
  • Using the YUM command
  • yumdownloader
  • Configuring YUM
  • The dselect & APT Frontends to dpkg
  • Aptitude
  • Configuring APT
  • Working with RPMs on Ubuntu
  • Querying the RPM Database

Work on the command line:
  • Use the shell prompt.
  • Use command line utilities.
  • Access help facilities.
Process text streams using filters:
  •Send text files and data through text utility filters.
  •Combine files using text processing commands.
Perform basic file management:

  •Copy, move, and remove files and directories.
  •Create and manage hard and symbolic links.
Use streams, pipes, and redirects:
  •Redirecting standard input, output, and error.
  •Use pipes to connect commands.
  •Use tee to send output to multiple files.
Create, monitor, and kill processes:
  •Run and manage background processes.
  •Monitor running processes.
  •Terminate processes.
Modify process execution priorities:
  •Understand the priority of a process.
  •Change the priority of a process using nice and renice.
Search text files using regular expressions:
  •Create regular expressions.
  •Use regular expressions to search text.
Perform basic file editing operations using vi:

  •Navigate, edit, and save text using the vi text editor.

  •LPI Objectives Covered

  •Text Editing

  •vi and Vim

  •Learning v

  •Basic vi

  •Intermediate vi

  •Text Editing with Vim

Create partitions and filesystems:

    • Use various partitioning tools.
    • Common file system types
    • create swap space
    • Create and format filesystems.
    • Maintain the integrity of filesystems.
Maintain the integrity of filesystems:
    • Verify filesystem integrity.
    • Repair filesystem issues.
    • Monitor free space and inodes.
Control mounting and unmounting of filesystems:
    • Mount and unmount various types of filesystems.
    • Configure filesystem mounting on boot.
Manage file permissions and ownership:
    • Set permissions on files and directories.
    • Grant and revoke access to files.
    • Set special permissions and file attributes.
Create and change hard and symbolic links:
    • Create hard and symbolic links.
    • Identify and handle hard and symbolic link issues
Understand the FHS:
    • Understand the filesystem hierarchy standard.
    • Maintain the correct locations of system files.

Manage runlevels.
Stage of linux boot processes
configuring GRUB
GRUB Legacy configuration
GRUB2
install GRUB boot loader
kernel parameter
Kernet boot time-message
change default run level
Runlevel scripts
service control from the command line
GUI Service configuration tool
Boot and shut down a system.

Customize and use the shell environment.
Use shell scripting for various purposes.
Manage files and directories

Manage user and group accounts.
User accounts and the password file
group and the group file
the shadow password and shadow group systems
group password and shadow groups
Automate system tasks.
Maintaining the System Time
Understanding Linux Time Concepts
Viewing and Setting Time
Understanding the Network Time Protocol
Using the NTP Daemon
Using the chrony Daemon
Manage printing

Configure the system to start services at boot.
The Initialization Process
Using the systemd Initialization Process
Exploring Unit Files
Focusing on Service Unit Files
Focusing on Target Unit Files
Looking at systemctl
Examining Special systemd Commands
Using the SysV Initialization Process
Understanding Runlevels
Investigating SysVinit Commands
Stopping the System
Maintain and monitor system services

 Fundamentals of internet protocols.
TCP/IP services
understanding hosnames
TLDs and subDomain
resolving hostnames
TCP/IP utilities
configuration files
common manual network interface tasks
DHCP
SSH

 Perform security administration tasks.
Administering Network Security
Administering Local Security
Looking at SSH
Set up host security.

Lpic 2

1.Kernel Components: Compile, configure, and install a Linux kernel.

2.System Startup: Boot the system.

3.Filesystem Management: Create and manage file systems, including encryption.

4.Hardware: Configure and manage hardware components and devices.

5.Filesystem Structures: Understand and use various filesystems.

1.Customizing Startup and Boot Procedures: Customize system startup and boot processes.

2.Init: Identify and manage the init system.

3.System V: Manage System V init scripts and services. 4.System Recovery: Implement system recovery procedures.

1.Partitioning and Formatting: Create, maintain, and troubleshoot file systems.

2.Mounting: Configure and troubleshoot disk devices and filesystems.

3.Filesystem Features: Manage advanced file system features.

4.Swap: Configure and manage swap space.

5.Devices and Kernel Modules: Manage storage devices and kernel modules.

1.RAID: Configure and manage RAID.

2.LVM: Implement and manage Logical Volume Manager (LVM).

    1. Understanding LVM

    2. Creating Logical Volumes

    3. Supporting Logical Volumes

    4. Understanding the Device Mapper

  1. Networking Basics

  2. Configuring Network Features

      1. Network Configuration Files

      2. Graphical Tools

      3. Command-Line Tools

    3. Basic Networking Configuration: Configure network settings.

4.Advanced Network Configuration: Implement advanced network configurations. 5.Troubleshooting Network Issues: Troubleshoot network connectivity issues.

6.DNS: Configure DNS resolution and troubleshoot DNS issues.

1.System Monitoring Basics:

  •Understanding the importance of system monitoring.

  •Key metrics to monitor: CPU usage, memory utilization, disk activity, and network traffic.

 

2.Command Line Tools:

  •Using command-line utilities like top, htop, and iotop to monitor system resource usage in real-time.

 

3.Sysstat and sar:

  •Configuring and using the sysstat package to collect and analyze system performance data over time using the sar command.

 

4.Graphical Tools:

  •Exploring graphical system monitoring tools like GNOME System

 

5.Monitor, KSysGuard, and htop. 5.Log Analysis:

  •Analyzing system logs (e.g., /var/log) for error messages and diagnostic information.

  •Understanding the structure of log files.

 

6.Performance Monitoring:

  •Utilizing tools like vmstat, iostat, and nload for monitoring various performance metrics.

 

7.Network Monitoring:

  •Using network monitoring tools like iftop, nload, and nethogs to monitor network activity.

  •Configuring network traffic analysis with Wireshark.

 

8.Disk and File System Monitoring:

  •Monitoring disk activity and I/O performance with tools like iotop and iostat.

  •Checking disk space usage with df and du.

 

9.Process Monitoring:

  •Tracking running processes and their resource usage with tools like ps and htop.

  •Identifying and managing resource-intensive processes

 

10.Performance Tuning:

  •Using monitoring data to identify and resolve performance bottlenecks.

  •Implementing system optimizations based on monitoring insights.

 

11.Log Rotation and Retention:

  •Configuring log rotation to manage log file size and retention periods.

  •Using log analyzers like Logwatch and Logrotat

Configuring a DNS Server

Understanding DNS and BIND

Configuring DNS on Linux

Starting, Stopping, and Reloading BIND

Configuring BIND Logging

 

Creating and Maintaining DNS Zones

Exploring BIND Zone Files

Managing BIND Zones on Linux Securing a DNS Server

Setting Up Basic Security

Jailing BIND

Using DNSSEC

1.Installation and Configuration:

Installing Nginx on your chosen Linux distribution.

Configuring Nginx for load balancing. 2.Server Blocks for Load Balancing:

Configuring server blocks for load balancing multiple backend servers. Setting up and defining load balancing algorithms (e.g., round-robin, least connections).

 

3.Health Checks:

Configuring health checks to monitor the availability of backend servers.

Managing server states based on health check results.

 

4.Session Persistence:

Configuring session persistence (stickiness) to maintain client sessions on the same backend server.

 

5.TLS/SSL Termination:

Enabling SSL termination on Nginx to offload SSL/TLS encryption from backend servers.

Managing SSL certificates and ciphers for load-balanced connections. 6.Optimizing Load Balancing:

Tuning Nginx settings for optimal load balancing performance. Configuring timeouts and buffering.

1.Installation and Configuration:

Installing Keepalived on multiple load balancer nodes.

Configuring Keepalived for high availability.

2.VRRP (al Router Redundancy Protocol):

 •Setting up virtual IP addresses and routers.

Configuring VRRP for failover.

3.Health Checking and Failover:

Implementing health checks to monitor the health of load balancer nodes.

Automating failover when a node becomes unavailable.

4.Load Balancer Node Sync:

Synchronizing Nginx configurations between the active and standby nodes.

5.Monitoring and Logging:

Monitoring the status and performance of Keepalived and load balancer nodes.

Configuring logging for diagnostics and troubleshooting.

6.Security and Access Control:

Implementing security measures to protect Keepalived and load balancer nodes.

Access control for administrative interfaces.

1.Installation and Setup:

Installing HAProxy on your chosen Linux distribution.

Configuring the basic settings in the HAProxy configuration file.

2.Load Balancing:

Configuring load balancing for distributing incoming traffic among multiple backend servers.

Implementing various load balancing algorithms, such as round-robin, least connections, and source IP-based load balancing.

 

3.Health Checks:

Setting up health checks to monitor the availability of backend servers.

Managing server states based on health check results. 4.Session Persistence:

Configuring session persistence (stickiness) for maintaining client sessions on the same backend server.

 

5.SSL Termination:

Enabling SSL termination on HAProxy to offload SSL/TLS encryption from backend servers.

Configuring SSL certificates and ciphers. 6.ACLs and Access Control:

Using Access Control Lists (ACLs) to control access to specific services and backends.

 

7.High Availability and Failover:

Setting up high availability configurations for HAProxy to ensure system uptime.

Implementing failover mechanisms.

 

8.Logging and Monitoring:

Configuring and managing logs for troubleshooting and monitoring.

Integrating with monitoring tools and log analyzers.

 

9.Security and Protection:

Protecting against common security threats, like DDoS attacks and SQL injection.

Implementing security measures for HAProxy. 10.Customizing Error Pages:

Creating custom error pages for improved user experience.

 

11.HTTP Compression and Optimization:

Compressing and optimizing HTTP responses for improved performance.

 

12.Advanced Routing and Redirection:

Configuring advanced routing and URL redirection based on request criteria.

مدرس دوره

آرزو محمدی

سال ۹۳، وارد دانشگاه شدم و در رشته IT تحصیل کردم. سال ۹۷، به عنوان کارشناس شبکه در شرکت سامسونگ استخدام شدم و با لینوکس آشنا شدم. سال ۹۸، به عنوان network administrator در فناپ سافت کار کردم و علاقه‌مند به دواپس شدم. پس از ۱ سال و نیم در شرکت گلرنگ سیستم، به عنوان DevOps Engineer در اسنپ تریپ مشغول به کار شدم.

نظرات

سوالات و نظراتتون رو با ما به اشتراک بذارید
بازخورد (Feedback) های اینلاین
مشاهده همه دیدگاه ها

محصولات مرتبط