Overview/Description
Linux is used extensively on the internet, usually as servers, but also as clients, and a system administrator must know how to configure and use the network interfaces on a Linux system. In this course, you will learn how to configure, use, and troubleshoot networking issues on Linux. This course covers the fundamentals of Internet Protocols, Network Interfaces, DNS, and security as it applies to the networking configuration of a Linux system. This course is one of a series in the Skillsoft learning path that covers the objectives for the CompTIA Linux+ exams LX0-104.
Target Audience
System administrators and network administrators who need a basic understanding of networking in Linux, who may have to manage the networking interfaces, DNS, security, and need to be able to troubleshoot common networking issues
CompTIA Linux+ 2014 Powered By LPI: LX0-104 Networking Fundamentals
start the course
describe how network masking and Classless Inter-Domain Routing, or CIDR, work
describe the differences between private and public "dotted quad" IP addresses
describe the features and differences of User Datagram Protocol, or UDP; Transmission Control Protocol, or TCP; and Internet Control Message Protocol, or ICMP
recognize the common TCP and UDP ports and services that usually run on those ports
identify the differences between IPv4 and IPv6
describe the basic features and advantages of IPv6
configure manually, and automatically, the systems network interfaces
configure the basic TCP/IP settings
configure the default route for a network interface
describe commands to start, stop, reconfigure, add, and delete network interfaces and routes to troubleshoot network interfaces
describe how to change, view, and configure the routing table, including correcting an improperly set default route
troubleshoot basic problems with network connectivity
troubleshoot problems with the network configuration
describe how to query remote DNS servers
configure local name resolution and configure the use of DNS servers
modify the order in which name resolution will be performed
describe the function and purpose of shadow passwords
perform the actions to turn off network services that are not in use
configure TCP wrappers to grant or deny access to services on the local system
configure and manage interfaces and networking in Linux