—Welcome to the Part 2 Exam Guide
6m 35s
105.1 Customize and Use the Shell Environment
- 37m 48s
—Introducing the Shell Environment
5m 37s
—Working with Variables
6m 54s
—Discretion with Aliases
2m 59s
—Being Functional at the CLI
6m 31s
—Understanding Login Scripts
5m 27s
—Persisting the Environment with Login Scripts
8m 1s
—Summary
2m 16s
105.2 Customize or Write Simple Scripts
- 52m 16s
—Save Hours Each Year By Learning to Script
4m 50s
—Writing Simple, Interactive Scripts
5m 48s
—Understanding Conditional Statements
6m 25s
—Writing IF Statements
11m 41s
—Writing CASE Statements
4m 4s
—Understanding Loops
3m 45s
—Writing FOR Loops and seq
3m 33s
—Mailing root and the SUID Permission
6m 57s
—Writing WHILE Loops and exec
5m 10s
105.3 SQL Data Management
- 40m 54s
—Becoming a DBA in Nine Tiny Lessons
3m 6s
—Installing MySQL
3m 35s
—Understanding Creating Databases
3m 58s
—Creating Databases and Tables
9m 5s
—Understanding Data Integrity Using Foreign Keys
4m 43s
—Implementing Foreign Keys and Using Joins
7m 39s
—Summarizing Data
2m 53s
—Using ORDER BY and GROUP BY
4m 35s
—Summary and What's Next
1m 15s
106.1 Install and Configure X11
- 25m 59s
—Introduction to X and the X.Org Foundation
5m 38s
—Retrieve Information About Your X Environment
5m 29s
—Adding Screen Resolutions Not Supplied by Standard
7m 24s
—Adding Additional Fonts
5m 58s
—Module Summary
1m 26s
106.2 Set Up a Display Manager
- 12m 53s
—Working with Display Managers
3m 12s
—Displaying User Avatars
3m 7s
—Installing and Configuring LightDM
5m 21s
—Summary
1m 11s
106.3 Accessibility
- 14m 58s
—Linux Accessibility Features
2m 3s
—Using the Screen Reader: We Call Him Roger
4m 15s
—High Contrast Themes, Large Print, and Zoom
2m 55s
—GOK, the On-screen Keyboard and AccessX
3m 46s
—Screen Readers and Gestures
1m 2s
—Summary
0m 55s
107.1 Manage User and Group Accounts and Related System Files
- 24m 9s
—Managing and Maintaining Users and Groups
3m 42s
—Creating Users
6m 32s
—Managing Passwords and Password Age
2m 14s
—Adding Aging Data to Passwords
4m 58s
—Managing Groups
3m 1s
—Special Accounts in Linux
3m 39s
107.2 Automate System Administration Tasks by Scheduling Jobs
- 35m 36s
—Let's Schedule a Meeting
6m 20s
—Using the System Cron File
5m 59s
—Making Use of User Crons
7m 12s
—Desktops Prefer Anacron
7m 9s
—Ad-Hoc Tasks with at
5m 4s
—Controlling Access to Scheduling
3m 50s
107.3 Localization and Internationalization
- 24m 12s
—Introducing Language and Cultural Rules
4m 30s
—Maintaining and Configuring the Linux Locale
5m 18s
—Understanding Character Encoding
3m 49s
—Working with Timezones
3m 18s
—Enhanced Management Using systemd with timedatectl and localectl
2m 34s
—/etc/localtime, ASCII, and Unicode
2m 20s
—Summary and What's Next
2m 20s
108.1 Maintain System Time
- 30m 6s
—Time Is All About Everything Not Happening at Once
3m 33s
—Cleaning Your Work Surface
4m 52s
—Working Through a Configuration
6m 35s
—Understanding NTP Tools and Insanity
2m 24s
—Using the NTP Toolbox
5m 29s
—System Time and Real Time - Yes, There Is a Difference
4m 9s
—The ntpd
0m 56s
—Summary and What's Next
2m 5s
108.2 System Logging
- 29m 50s
—Welcome to System Logging
6m 25s
—Configuring System Logging
7m 41s
—Rotating Log Files
6m 2s
—Using journalctl
5m 47s
—klogd and journald.conf
2m 27s
—Summary and What's Next
1m 25s
108.3 Mail Transfer Agents
- 20m 8s
—What Are the MTAs in Linux?
6m 42s
—Configuring exim4 on Debian 8
5m 18s
—Using Mail Tools
5m 52s
—Sendmail Emulation and qmail
1m 2s
—Summary and What's Next
1m 13s
108.4 Manage Printers and Printing
- 21m 32s
—Welcome to Printing
3m 33s
—Managing Printers via the Web Interface
6m 1s
—Command Line Printing with lp and lpr
5m 2s
—CLI Management of Printers with lpadmin
4m 4s
—Troubleshooting
1m 21s
—Summary and What's Next
1m 28s
109.1 Fundamentals of Internet Protocols
- 26m 46s
—Introducing Network Protocols
3m 31s
—Say Hello to the /etc/services File
2m 53s
—Becoming Bitwise with IP Addressing
6m 4s
—Working with IP Addresses
5m 3s
—Public / Private IP Addresses
1m 43s
—Subnetting and Protocol Stacks
7m 30s
109.2 Basic Network Configuration
- 32m 26s
—Introduction to Network Configuration
6m 39s
—Setting the Hostname and Resolution
7m 39s
—Gaining Individual Interface Control
7m 38s
—Configuring IP Addresses and Routes
5m 44s
—Testing Your Configuration and Module Summary
4m 45s
109.3 Basic Network Troubleshooting
- 19m 28s
—Introducing the Scenario
1m 4s
—The Internet Is Down: Sorting Fact from Fiction
6m 15s
—Working with Host Files
3m 41s
—Port Scanning to See Available Services
4m 53s
—Using netcat
1m 56s
—Summary and What's Next
1m 37s
109.4 Client Side DNS
- 14m 53s
—Introducing the Linux DNS Client
2m 25s
—Working with /etc/hosts
2m 28s
—DNS Client Name Resolution
2m 27s
—Using dig to Resolve Names
6m 36s
—Summary and What's Next
0m 56s
110.1 Perform Security Administration Tasks
- 33m 38s
—Welcome to Host Security
3m 23s
—Locating Files with Additional Permissions and Password Aging
7m 34s
—Understanding How to Limit Server Access
2m 40s
—Limiting Server Access Using PAM, Disabling User Accounts, and Port Scanning
8m 28s
—Delegating Rights with sudo
6m 10s
—Using ulimit
2m 16s
—Summary and What's Next
3m 3s
110.2 Set Up Host Security
- 25m 39s
—Introduction
3m 37s
—Listing Services and Restricting Logins
5m 47s
—XINETD: The Super Daemon
6m 7s
—Securing Services with TCP Wrappers
7m 44s
—Summary and What's Next
2m 21s
110.3 Securing Data with Encryption
- 42m 53s
—Introducing OpenSSH
6m 35s
—Configuring the SSH Daemon
4m 23s
—Using SSH Known Hosts on Local Client Configurations
7m 51s
—Public Key Authentication with SSH
5m 59s
—Implementing SSH Tunnels
6m 7s
—Using GPG to Encrypt Data
8m 22s
—Additional Key Types
2m 10s
—Module Summary
1m 22s