How to Install, Configure, Administer and Troubleshoot Linux® Seminar training classes conferences & workshops presented by SkillPath Seminars register for training on


Add your seminars

Training Calendar Creator Seminar Venues Training Provider Directory

New Seminar Search:  


Helpful links

find similar training...
Search by state...
Customer Support

Do you need help finding the right class, date, or location or other assistance?

Request information about upcoming training seminars workshops and conferences in   and other cities listed on Submit a support request and receive a prompt reply.

We guarantee this SkillPath Seminars training seminar

We are an authorized partner of SkillPath Seminars


Price protection. The price to attend How to Install, Configure, Administer and Troubleshoot Linux® is set by the training providerThere is no added charge for our services.

We honor most training provider coupons
*.   Call  a representative to see if your discount coupon applies.

Privacy. Your personal information won't be shared with anyone but the training provider SkillPath Seminars.

Security. When you register for this seminar on your personal data and payment information is safely collected and processed using secure SSL encryption technology.

Flexibility. offers you three ways to register for How to Install, Configure, Administer and Troubleshoot Linux® seminar by SkillPath Seminars.
Register online, by phone (800) 349-1935,or fax (800) 712-5569
Who should attend How to Install, Configure, Administer and Troubleshoot Linux®
Linux users and administrators
Write and read SkillPath Seminars reviews and reviews about the training seminar How to Install, Configure, Administer and Troubleshoot Linux® on the Seminar News Network and the Training News Network.

Frequently asked questions and registration options for the training seminar How to Install, Configure, Administer and Troubleshoot Linux®

Find Training Near You
Use our clickable map to find training near you
Use Our Clickmap
hotel seminars meeting space directory
hotel meeting space training facilities restaurant and lodging


request on site training details for the How to Install, Configure, Administer and Troubleshoot Linux® seminarRequest on site training

How to Install, Configure, Administer and Troubleshoot Linux®  

 Email information about this seminar How to Install, Configure, Administer and Troubleshoot Linux® by SkillPath Seminars to yourself your manager or associatesEmail this event... View and register for other training seminars like How to Install, Configure, Administer and Troubleshoot Linux® by SkillPath Seminars on See similar training.. Find and register for other training seminars by SkillPath Seminars on Other seminars from SkillPath Seminars


training seminars by SkillPath Seminars SkillPath Seminars   


Linux users and administrators


see Registration info for seminar cost, group discount etc.

Seminar Summary:

Discover the secrets of this versatile, FREE operating system! (see full course description)


 Seminar / Training class dates & locations



No seminar dates for this event are currently scheduled.  Please use the seminars search box above or choose one of the following additional training search options to find similar training.

Providers course catalog

Find seminars by state

Find seminars by city

Request on site training

Use Advanced Search



print the agenda print agenda for the How to Install, Configure, Administer and Troubleshoot Linux® seminar


Training Course Syllabus:

You’ll learn ...
To optimize the Linux kernel for maximum performance
To protect your Linux-based systems from both internal and external attacks
Troubleshooting even the most complex Linux installation or integration problems
To complete remote administration tasks without ever leaving your desk
And much more
What could be better than a free operating system and free software? How about some clear, practical information on how to make the most of it? The Linux system is wildly popular, but the existing manuals and resources leave something to be desired. Which is why we put together this practical, hands-on workshop that focuses on the real-world needs of system and network administrators, IT professionals, support staffs and others involved with planning or implementing Linux and related software--you´ll learn the techniques, methods and procedures you need to make the most out of this incredible operating system and its associated applications.



Day one: 8:00 a.m. – 5:00 p.m.

Linux® essentials
The key to a successful Linux installation is to understand what´s behind this powerful operating system. We´ll begin this session by showing you what´s "under the hood" of Linux and how it´s changed since it was first developed back in 1991. You´ll find out how the various distributions stack up against each other and gain hands-on installation experience, with step-by-step instruction and display screen demonstrations so you´ll know the correct steps and procedures before you complete an installation on your own. You´ll also find out ...
How to complete the basic configuration steps that are common to all Linux installations
How to decipher the on-screen messages that appear during the boot and shutdown processes
How to successfully troubleshoot a failed Linux installation
How Linux boot managers work and how to use them to boot into other operating systems
A quick and easy way to create a Linux Loader (LILO) boot floppy disk—a must-have for all administrators
The right way to install and configure the X Window System to avoid the common pitfalls and problems that plague many Linux administrators

Must-know administration tools and techniques

Getting Linux installed and completing the initial configuration is only half the battle—you need to understand the intricate details of Linux administration to keep these complex systems running at optimum performance levels. This session will give you the tools you need to complete a variety of everyday administration tasks, such as adding new users and controlling processes that run on your systems. You´ll gain a thorough understanding of the Linux command line and learn some little-known tricks that´ll make using the command line a much simpler process than it was back in the old DOS days. You´ll get practical, hands-on experience setting up users and groups from a command line by using a graphical interface or even remotely, through a Web browser. You´ll also discover ...
The function of nearly every command used in Linux, and when you can accomplish the same task more efficiently by using a graphical tool
How to create users and groups with a command line and with graphical tools ... and how to change ordinary user accounts into super-user accounts
How to install and configure disk quotas so you can control the amount of hard drive space that users can consume
The best way to monitor and control processes to make sure your applications are functioning properly, so they´re not consuming all your server´s resources

Simplifying the complexities of network administration

This session will help demystify some of the most complex tasks that a network administrator can face, such as configuration of a network interface or setting up a router. Through our unique demonstration and teaching methods, these complex tasks will seem straightforward, clear and easy to retain and repeat. This session is great for anyone in the networking field, from newcomer to experienced network veteran. You´ll discover ...
How TCP/IP addressing really works, what a subnet mask is and how to determine the right subnet mask to use on your network
How to make use of the network administrator´s utilities, such as ifconfig, dig and more
The right way to configure network interfaces on your Linux systems for trouble-free operation and maximum network performance
How to assign multiple IP addresses to a single network interface that will allow you to host multiple Web sites on a single server
How to turn your Linux system into a fully functional router and eliminate the need to purchase expensive hardware routers
How to install and configure the IPXTM protocol for NetWare® connectivity

Integrating Linux with UNIX®-based systems

Linux and UNIX may look similar, but in fact they´re two very distinct and different operating systems. To enable file sharing between these two systems, you must use the Network File System (NFS). We´ll show you the two packages that must be installed in order to turn your system into an NFS server, and then you´ll learn how to configure your server once it´s up and running. Plus you´ll go through a hands-on exercise in installing and configuring NFS. You´ll also learn ...
How to map users between the NFS server and clients, and how to disable the "nobody" default setting for mapping of the root user and group
NFS client installation and configuration tips and techniques
How an NFS server can allow access to those without privileges, and tips on how to secure your NFS server
How to use rdist to distribute and maintain identical files among multiple computers on your network

Your key to success—integrating Linux® with Windows®-based computers

A main benefit of a truly great operating system is its ability to integrate seamlessly with computers running other operating systems. Linux can connect to virtually any other operating system, including Windows-based computers—and we´ll show you how to get them to use your Linux files and printers, and how to use Linux systems as clients to access your Windows-based files and printers. Linux´s Samba server allows integration with Windows´ Server Messages Block (SMB) protocol, and this important session will show you how to correctly install and configure Samba server and client software. You´ll gain hands-on experience by connecting to shared resources on a Windows server and configuring the Samba server to share files with the Windows server. You´ll also learn ...
How to configure the Samba server by modifying the configuration file with a simple text editor
How to configure a Samba server using a variety of graphical configuration tools
How to turn the Linux server into a Windows file and print server, and how to configure it to authenticate users by emulating a Microsoft® Windows Domain controller
A quick and easy way to access shared Windows resources from your Linux-based computer using a simple command line utility
How to implement proper security on your Samba server to prevent unauthorized resource access

Day two: 8:00 a.m. – 5:00 p.m.

Setting up Internet/intranet services
As Internet and intranet services have become integral components of many successful companies throughout the world, ease and efficiency of these functions have become vitally important. Linux is arguably one of the best operating systems when it comes to providing both Internet and intranet connectivity services, but a thorough understanding of installation and configuration techniques is required in order to create a stable and secure environment. This session will show you the best techniques for setting up services such as DNS, e-mail, Web and FTP server services, plus provide you with plenty of tips so you can avoid common problems. During the lab, you´ll complete an installation and configuration and set up each service, focusing on getting the best performance possible. You´ll also learn ...
How DNS works and how to turn your Linux server into a fully functional DNS server
How to set up SMTP mail service—a must-have service for every business
How to configure and secure the Sendmail program so you don´t have to worry about hackers reading your e-mail
How installing POP3 mail services can allow multiple clients to utilize your Linux e-mail with little or no client configuration necessary
Why 65% of all Web servers are running Apache® Web server software and how you can install and configure this very popular package on your Linux server to set up your own Web site
How to install, configure and secure FTP services on your Linux server

Securing Linux-based computers

Every computer connected to a network or the Internet is a potential security risk. Even non-networked computers that contain sensitive data are at risk if physical security isn´t maintained. This session will take you, step by step, through the process of securing Linux systems ... and you´ll also gain practical, hands-on experience during the classroom security lab. By using the tools that hackers use to break into systems, you´ll uncover Linux´s security flaws and learn how to eliminate them ... plus you´ll test your newly secure configuration by attempting to gain unauthorized access to each system. Additionally, you´ll learn about common weak spots in physical security and find out what steps you must take to protect your systems while still allowing normal access by authorized users. You´ll also learn ...
How to restrict access to sensitive areas by normal and super-users, and how to keep normal users from obtaining super-user access
The tremendous security risk caused by Linux´s default storage of usernames and passwords—and what you can do about it
How you can use Pluggable Authentication Modules (PAM) to fine-tune the authentication process and provide increased security for your systems
Which unnecessary services should be removed to increase security
How to use Tripwire® to detect spoofed files on your system and maintain system file integrity
How weak passwords can be easily cracked and how to make sure that your users are creating hard-to-crack passwords

Protecting networked systems

Protecting individual systems is only the first step toward security—you also need to protect networks from exterior and interior attacks. During this session, you´ll discover how intruders can use a technique called IP Spoofing to trick a computer into thinking it is communicating with one that has been authenticated, and you´ll learn the best way to protect against this type of attack. We´ll show you how to design a secure network from the ground up, and you´ll find out how to use IP masquerading between users and the outside world to make sure the only traffic coming into your network from the outside has been requested by an internal user. You´ll also learn ...
How to deploy a packet-filtering firewall
The steps necessary to install and configure the Squid Proxy Server to provide a secure single connection point to the Internet for all internal users
How to use a port scanner to scan your network for vulnerabilities
How to monitor your network to detect intruders and what you can do to minimize any further damage if you´ve discovered an intruder

Virtual Network Computing—sharing remote desktops

Wouldn´t it be great to be able to install applications just once and have them available to all network users, without having to install them on remote computers? And, as long as you´re wishing, wouldn´t it also be terrific if you could make better use of older legacy hardware and eliminate annual or biannual upgrades of user systems? By using Virtual Network Computing (VNC), all of this—and much more—is now available through Linux®. This session will show you how to save time, energy and money by installing and configuring the VNC package. Before long, underused legacy hardware will be functioning as dumb terminals operating off your high-end server ... you´ll install software just one time on your server and allow remote clients access to run it as if it was installed on their local machines ... and much more! You´ll also learn ...
How you can use VNC to share desktops with other Linux machines, or even machines running other operating systems, such as Windows® 2000 or Windows XP
How you can administer your Linux server from a Windows-based computer, and how to run Linux on your Windows-based computers without installing it to their local drives!
The right way to configure the VNC server display modes so end users don´t see a garbled display
How to configure security on your VNC system to avoid problems that can occur when end users get into sensitive areas or modify system settings
The six most common problems with VNC, and how to troubleshoot and resolve each of them

Performance monitoring and troubleshooting

After you´ve installed and configured your Linux-based systems, proper monitoring will ensure they´re running at peak performance or alert you if they aren´t. This session will show you the best ways to monitor the performance of systems and alert you to possible problems, so you can be more effective at troubleshooting. You´ll learn how to monitor the processor to make sure it isn´t overworked, and we´ll show you how to reduce the processor´s load so you don´t have to continually purchase faster processors. You´ll also find out ...
How to monitor the memory utilization of systems, and how to schedule tasks to run after regular business hours to allow you to do more while you´re at work
Which log files must be monitored and how to decipher the information that they contain
How to troubleshoot Linux software applications and what to do if your X Window System interface won´t start
How to troubleshoot peripheral devices such as modems, sound cards, video cards, printers and much more
How to troubleshoot the Linux kernel and how to reconfigure the kernel to meet your needs

Seminar Summary:

Discover the secrets of this versatile, FREE operating system! (see full course description)

print this agenda print agenda for the How to Install, Configure, Administer and Troubleshoot Linux® training seminar

 view dates and locations for this seminar


 SkillPath Seminars training and seminar course catalog

Click any title to view upcoming SkillPath Seminars training event dates and locations, class syllabus and other seminar details





  Also try the advanced seminar search tool

   FindaSeminar HomeComputer Training

unix training
training classes

 © 2002-2018™ All Rights Reserved.  Terms of Use |  Privacy Policy |  Training News Network