Course Description
Linux Fundamentals focuses on the fundamental tools and concepts of Linux. Beginners develop a solid foundation in Linux, while advanced users discover patterns and fill in gaps in their knowledge. Students gain proficiency using the command line. Topics include: basic file manipulation; basic and advanced filesystem features; I/O redirection and pipes; text manipulation and regular expressions; managing jobs and processes; vi, the standard Unix editor; automating tasks with shell scripts; managing software; secure remote administration; and more. Also, this course is designed to provide extensive hands-on experience.
Linux Fundamentals Dec 2025Linux Fundamentals
Unix and its Design Principles
FSF and GNU
General Public License
The Linux Kernel
Linux Kernel and Versioning
Components of a Distribution
Slackware
SUSE Linux Products
Debian
Ubuntu
Red Hat Linux Products
Oracle Linux
LOGIN AND EXPLORATIONLogging InRunning ProgramsInteracting with Command LineDesktop EnvironmentsGNOMEStarting XGathering Login Session InfoGathering System Infouptime & wgot root?Switching User ContextssudoHelp from Commands and DocumentationwhereisGetting Help Within the Graphical Desktop, man, & info$MANPATH, whatis and apropos
Logging In
Running Programs
Interacting with Command Line
Desktop Environments
GNOME
Starting X
Gathering Login Session Info
Gathering System Info
uptime & w
got root?
Switching User Contexts
sudo
Help from Commands and Documentation
whereis
Getting Help Within the Graphical Desktop, man, & info
$MANPATH, whatis and apropos
THE LINUX FILESYSTEMFilesystem SupportUnix/Linux Filesystem FeaturesFilesystem Hierarchy StandardNavigating the FilesystemDisplaying Directory ContentsFilesystem StructuresDetermining Disk Usage With df and duDetermining Disk Usage (GUI)Disk Usage with QuotasFile OwnershipDefault Group OwnershipFile and Directory PermissionsFile Creation Permissions with umaskSUID and SGID on filesSGID and Sticky Bit on DirectoriesChanging File PermissionsUser Private Group Scheme
Filesystem Support
Unix/Linux Filesystem Features
Filesystem Hierarchy Standard
Navigating the Filesystem
Displaying Directory Contents
Filesystem Structures
Determining Disk Usage With df and du
Determining Disk Usage (GUI)
Disk Usage with Quotas
File Ownership
Default Group Ownership
File and Directory Permissions
File Creation Permissions with umask
SUID and SGID on files
SGID and Sticky Bit on Directories
Changing File Permissions
User Private Group Scheme
MANIPULATING FILESDirectory ManipulationFile ManipulationDeleting and Creating FilesManaging Files GraphicallyDrag and drop with NautilusPhysical Unix File StructureFilesystem LinksFile Extensions and ContentDisplaying and Previewing FilesProducing File StatisticsDisplaying Binary FilesSearching the FilesystemAlternate Search Method
Directory Manipulation
File Manipulation
Deleting and Creating Files
Managing Files Graphically
Drag and drop with Nautilus
Physical Unix File Structure
Filesystem Links
File Extensions and Content
Displaying and Previewing Files
Producing File Statistics
Displaying Binary Files
Searching the Filesystem
Alternate Search Method
SHELL BASICSRole of Command ShellCommunication ChannelsFile RedirectionPiping Commands TogetherFilename MatchingFile Globbing and Wildcard PatternsBrace ExpansionShell and Environment VariablesKey Environment VariablesWhich and TypeGeneral Quoting RulesNesting Commands
Role of Command Shell
Communication Channels
File Redirection
Piping Commands Together
Filename Matching
File Globbing and Wildcard Patterns
Brace Expansion
Shell and Environment Variables
Key Environment Variables
Which and Type
General Quoting Rules
Nesting Commands
ARCHIVING AND COMPRESSIONArchives with tar and cpioThe gzip, bzip2, and XZ Compression UtilityThe PKZIP Archiving/Compression formatGNOME File Roller
Archives with tar and cpio
The gzip, bzip2, and XZ Compression Utility
The PKZIP Archiving/Compression format
GNOME File Roller
TEXT PROCESSINGSearching Inside FilesThe Streaming EditorText Processing with AwkReplacing Text CharactersText SortingDuplicate Removal UtilityExtracting Columns of TextCombining Files and Merging TextComparing File Changes
Searching Inside Files
The Streaming Editor
Text Processing with Awk
Replacing Text Characters
Text Sorting
Duplicate Removal Utility
Extracting Columns of Text
Combining Files and Merging Text
Comparing File Changes
REGULAR EXPRESSIONSRegular Expression Overview and ImplementationsRE Character ClassesRegex QuantifiersRE Parenthesis
Regular Expression Overview and Implementations
RE Character Classes
Regex Quantifiers
RE Parenthesis
TEXT EDITINGText EditingPico/GNU NanoPico/Nano InterfaceNano configurationPico/Nano Shortcutsvi and VimLearning VimBasic and Intermediate vi
Text Editing
Pico/GNU Nano
Pico/Nano Interface
Nano configuration
Pico/Nano Shortcuts
vi and Vim
Learning Vim
Basic and Intermediate vi
MESSAGINGSystem Messaging CommandsControlling System MessagingInternet Relay ChatInstant Messenger ClientsElectronic MailSending Email with sendmail and PineSending and Receiving Email with mailx and muttEvolution
System Messaging Commands
Controlling System Messaging
Internet Relay Chat
Instant Messenger Clients
Electronic Mail
Sending Email with sendmail and Pine
Sending and Receiving Email with mailx and mutt
Evolution
COMMAND SHELLSShellsIdentifying and Changing the ShellShell Configuration FilesScript ExecutionBourne Shell: Shell PromptsBash: Bourne-Again ShellBash: Configuration FilesBash: Command Line HistoryBash: Command EditingBash: Command CompletionBash: "shortcuts"Bash: promptSetting Resource Limits via ulimit
Shells
Identifying and Changing the Shell
Shell Configuration Files
Script Execution
Bourne Shell: Shell Prompts
Bash: Bourne-Again Shell
Bash: Configuration Files
Bash: Command Line History
Bash: Command Editing
Bash: Command Completion
Bash: "shortcuts"
Bash: prompt
Setting Resource Limits via ulimit
INTRODUCTION TO SHELL SCRIPTINGShell Script Strengths and WeaknessesExample Shell ScriptPositional ParametersInput & OutputDoing MathExit StatusComparisons with testConditional StatementsFlow Control: caseThe borne for-LoopThe while and until Loops
Shell Script Strengths and Weaknesses
Example Shell Script
Positional Parameters
Input & Output
Doing Math
Exit Status
Comparisons with test
Conditional Statements
Flow Control: case
The borne for-Loop
The while and until Loops
PROCESS MANAGEMENT AND JOB CONTROLWhat is a Process?Process Lifecycle and StatesViewing ProcessesSignalsTools to Send Signalsnohup and disownManaging ProcessesTuning Process SchedulingJob Control Overview and CommandsPersistent Shell Sessions with tmux and ScreenUsing screenAdvanced Screen
What is a Process?
Process Lifecycle and States
Viewing Processes
Signals
Tools to Send Signals
nohup and disown
Managing Processes
Tuning Process Scheduling
Job Control Overview and Commands
Persistent Shell Sessions with tmux and Screen
Using screen
Advanced Screen
AT AND CRONAutomating Tasksat/batchcronThe crontab Commandcrontab Format/etc/cron.*/ DirectoriesAnacronSystemd Timers
Automating Tasks
at/batch
cron
The crontab Command
crontab Format
/etc/cron.*/ Directories
Anacron
Systemd Timers
MANAGING SOFTWAREDownloading with FTPFTPlftpCommand Line Internet Non-interactiveCommand Line Internet InteractiveManaging Software DependenciesUsing the Yum commandUsing Yum historyYum package groupsConfiguring YumyumdownloaderPopular Yum RepositoriesUsing the Zypper commandZypper Services and CatalogsThe dselect & APT Frontends to dpkgAptitudeConfiguring APT
Downloading with FTP
FTP
lftp
Command Line Internet Non-interactive
Command Line Internet Interactive
Managing Software Dependencies
Using the Yum command
Using Yum history
Yum package groups
Configuring Yum
yumdownloader
Popular Yum Repositories
Using the Zypper command
Zypper Services and Catalogs
The dselect & APT Frontends to dpkg
Aptitude
Configuring APT
THE SECURE SHELL (SSH)Secure ShellOpenSSH Client & Server ConfigurationAccessing Remote ShellsTransferring FilesAlternative sftp ClientsSSH Key Managementssh-agent
Secure Shell
OpenSSH Client & Server Configuration
Accessing Remote Shells
Transferring Files
Alternative sftp Clients
SSH Key Management
ssh-agent
MOUNTING FILESYSTEMS & MANAGING REMOVABLE MEDIAFilesystems Concept ReviewMounting FilesystemsNFSSMBFilesystem Table (/etc/fstab)AutoFSRemovable Media
Filesystems Concept Review
Mounting Filesystems
NFS
SMB
Filesystem Table (/etc/fstab)
AutoFS
Removable Media
PRINTINGLegacy Print SystemsCommon UNIX Printing SystemDefining a PrinterStandard Print CommandsFormat Conversion Utilitiesenscript and mpage
Legacy Print Systems
Common UNIX Printing System
Defining a Printer
Standard Print Commands
Format Conversion Utilities
enscript and mpage
THE X WINDOW SYSTEMThe X Window SystemX ModularityX.Org DriversConfiguring X ManuallyAutomatic X ConfigurationXorg and FontsInstalling Fonts for Modern and Legacy ApplicationsThe X11 Protocol and Display NamesDisplay Managers and Graphical LoginStarting X Apps AutomaticallyX Access ControlRemote X Access (historical/insecure) and )modern/secure)XDMCPRemote Graphical Access With VNC and RDPSpecialized X Servers
The X Window System
X Modularity
X.Org Drivers
Configuring X Manually
Automatic X Configuration
Xorg and Fonts
Installing Fonts for Modern and Legacy Applications
The X11 Protocol and Display Names
Display Managers and Graphical Login
Starting X Apps Automatically
X Access Control
Remote X Access (historical/insecure) and )modern/secure)
XDMCP
Remote Graphical Access With VNC and RDP
Specialized X Servers
EMACSThe Emac InterfaceBasic Emacs and commands
The Emac Interface
Basic Emacs and commands
Related Certificates
Earning a Saint Louis University Workforce Center certificate allows you to enhance your career options by networking with peers and establishing valuable industry contacts.
ISACA Professional Certificate
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud.
See Details
Artificial Intelligence and Large Language Models Foundations
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud.
See Details
Artificial Intelligence and Machine Learning for Cybersecurity Operations
Artificial intelligence (AI) and machine learning (ML) are revolutionizing the cybersecurity industry. The emergence of ML as a tool for...
See Details