Linux Fundamentals

Picture of Linux Fundamentals
Quick Facts
  • Delivery Method Online
  • Professional Certificate
  • 24hrs Suggested Study Time
  • 3 Months Access
  • Tutor Support
  • Study On Any Device
  • 1721 Students

Learn how to use the Linux desktop operating system along with the included productivity, multimedia, and Internet software.

In this self-paced online course, you'll master the free Linux desktop system, which can perform all of the functions you currently do with Microsoft Windows or Apple Macintosh.

We'll start with the basics of Linux as we practice using its graphical environment to manipulate files and folders, create user accounts, and set up hardware devices. Then we'll delve into the many free programs that come preinstalled on your Linux system, including the popular OpenOffice.org office productivity software. This exciting application allows you to read and create word documents, spreadsheets, and presentation graphics that are compatible with the Microsoft Office suite. Next, we'll cover the Linux multimedia programs that can play, rip, and burn CDs, as well as play DVDs and video files. We'll also discuss Linux audio-editing tools that enable you to create your own masterpieces.

After that, we'll walk through using your Linux desktop to access the Internet. You'll see how to connect to your ISP and use your ISP to read and send messages with Linux's e-mail software. Finally, we'll explore keeping in touch with friends and family by using common Internet Messaging hosts, as well as how to browse your favorite Web sites with the popular Mozilla Firefox Web browser.

Get ready to discover why so many people think Linux makes their computer easier, cheaper, and more fun!

Courses are delivered to you through expertly executed lessons, online instruction and interaction with like-minded students. Our courses are designed to deliver all of the benefits of studying in a classroom whilst giving you the flexibility to study at a time and place to suit your needs. You can access your classroom 24/7 from any device with an internet connection.

This course has a 3 month duration. You'll complete comprehensive lessons, quizzes and assignments before submitting your final exam at the end of the course to achieve your certificate. Courses must be completed within the 3 month access period.

The Linux desktop operating system is quickly becoming a popular choice for both computer professionals and casual home users. In our first lesson, you'll find out the reasons for its popularity. You'll learn exactly what Linux is and why there are so many different Linux packages available. Then you'll discover how to select the Linux package that's right for you. And finally, we'll walk through installing and running the SimplyMEPIS version 6.5 Linux distribution, examining how to avoid some of the pitfalls associated with Linux.

Now that you have Linux installed on your PC, you have a desktop full of unfamiliar icons and menus. So in this lesson, we'll explore the SimplyMEPIS version 6.5 KDE desktop environment. You'll see how a Linux desktop differs from Microsoft Windows or Apple Macintosh. You'll also learn how to customize your desktop with shortcuts and menus so you can always have the items you need right at your fingertips.

No matter what programs you run on your computer, at some point you'll probably need to work with files. Today's lesson describes how Linux handles files and folders and shows you how to access them using Linux's graphical tools. The way Linux handles files is different from Microsoft Windows, and knowing about these differences is crucial to enjoying your Linux experience.

In this lesson, we'll delve into how Linux manages file security. We'll discuss users and groups, and how you can set permissions to files and folders. You'll use various Linux tools to create new users and groups, and assign them permissions on your Linux desktop. You'll find out how to restrict access to your personal files, and then you'll set up a group to share files among several users.

Today, you'll learn how Linux handles desktop printers. You'll see how to configure Linux to support your printer, and how to use your printer with common Linux applications.

In this lesson, you'll find out how Linux's OpenOffice.org packages can replace all Microsoft Office software products. Not only will you be able to create word processing documents, spreadsheets, and presentation graphic documents, you'll be able to read and modify existing documents that were created using Microsoft Office software.

We live in a multimedia world. No modern computer would be complete without the ability to play audio and video files. So today we'll cover how to use the tools available in Linux to perform all of your multimedia needs. You'll learn how to play CDs and DVDs on your Linux system, how to rip music, and how to burn your own CDs.

This lesson is about using your Linux PC to connect to the Internet. There are many ways to connect to it, and Linux supports them all. If you already have a dial-up or high-speed connection, today you'll find out how to use it with your Linux PC. We'll also walk through the software available on your Linux PC to surf, chat, and transfer files.

To many people, the most important feature of the Internet is e-mail. Today, you'll learn how to connect your Linux PC to your ISP e-mail mailbox. We'll discuss setting up and using Linux's popular KMail package.

In this lesson, we'll dig a little deeper into the Linux world. We're going to explore using command lines. By using system commands, you can manually extract information about your operating system. This is often easier and faster than relying on fancy graphical tools. So we'll go over a few simple commands you can use to examine your file system and see all of the applications that your system is currently running.

Even though Linux distributions generally include lots of software, at some point, most users come across additional software they'd like to have. So today, we'll discuss the various ways you can install software on your Linux PC. We'll cover installing it manually, as well as installing it by using graphical installation programs

In our final lesson, you'll learn some basic system administration techniques to help you when things go awry with your Linux system. We'll talk about backing up data and file archiving. You'll discover how Linux logs system events, and how to examine the log files to help troubleshoot any problems that occur. We'll also examine an interactive tool for watching system resources in real-time mode—seeing how the CPU and memory are performing, and how the programs you're running affect your system's resources.

Richard Blum

Richard Blum

Richard Blum has been an IT industry professional for over 18 years, working mainly as a network and systems administrator. During this time, he has worked with Microsoft, Novell, Unix, and Linux servers, and has created Web sites using a variety ... Read more

Read Richard Blum's Profile

Frequently Asked Questions

Once you've made the payment, we'll send you a confirmation email with a link to start your course. Feel free to get started whenever you're ready!

You'll have 3 months access to your course. In that time you are free to study at your own pace. The course duration is 24 hours.

Online learning is a flexible way to study that fits around your schedule, giving you the freedom to learn at your own pace from anywhere in the world. You'll have 3 months to complete the course and can take the multiple-choice questions and final exam whenever it suits you.

If you need help, you can contact us anytime. You can also join the discussion area where you can interact with other students. The discussion area for each lesson is open for the entire duration of the course.

Of course! We offer a 7-day money back guarantee. As long as you haven't completed the course, you can get a full refund within 7 days of enrolling.

We do not offer extensions or transfers for this self-paced course. However, you will have 3 months to complete the course, and if you need to cancel within the first 10 days of enrolment, we offer a money back guarantee.

The Learning Environment

From the moment that you enrol in the Linux Fundamentals you will become an integral part of our learning community. You'll find yourself with the freedom to learn at a speed that suits you, on any device, from anywhere in the world. Achieving your career goals no longer has to mean compromising family and work commitments.

Our Values

Learn At Your Own Pace

We believe in personalised learning. That's why we provide all the tools and support you need to succeed at your own pace. With flexible learning, you'll stay motivated and retain more information. Plus, you can balance your studies with work and family commitments to make your dreams a reality.

We Won't Break The Bank

Education should be accessible to anyone who wants to learn. That's why we offer some of the most competitive prices in the industry with payments plans for just $25 per week. Investing in your future is a smart choice and doesn’t have to break the bank.

Industry-Led Courses

There's no better way to learn than from experts with years of experience in your field. That's why each of our 200+ industry-led courses are designed to give you a real-life perspective on your industry. With our expert mentors, you'll learn from people who have a wealth of knowledge and experience, and who are passionate about sharing it with you.

Get The Personal Support You Deserve

At Vibe Learning, we're real people who are dedicated to providing you with personal support every step of the way. Our industry experts are not only professional and knowledgeable but also incredibly passionate about sharing their expertise with you. With their guidance, you'll gain invaluable insights and practical knowledge to help you succeed.

Still looking?

Check out the following courses related to Linux Fundamentals:

PC Security Advanced Online Course | Vibe Learning
 

PC Security Advanced

Picture of PC Security Advanced
Quick Facts
  • Delivery Method Online
  • Professional Certificate
  • 24hrs Suggested Study Time
  • 3 Months Access
  • Tutor Support
  • Study On Any Device
  • 2594 Students

Use ethical hacking techniques to locate and close security holes in your own network.

When is hacking legal? When you use it to secure your own network. This new method of hacking, called ethical hacking or white-hat hacking, uses common and readily available hacking tools and techniques to audit your network so you can locate and close security holes. Whether you're running a small home network or you're an enterprise network administrator, this course will teach you how to better protect your system against those who wish to gain unauthorised access.

You'll gain an understanding of the complex method of electronic breaking and entering. You'll learn the terms and programming behind the interaction between hardware and software when communicating through a network. You'll follow packets of data from one point to another through an entire network, and find out where the flaws exist for data loss and security breaches. You'll discover the role of the seven layers of the OSI model, and the dependencies of hardware and software interaction through packet transmission. And you'll find out how private data can quickly become public knowledge.

Hackers are costing businesses around the globe several billions of dollars every year. Don't become part of that sad statistic. Sooner or later, you know that somebody is going to try and break into your network. Why not learn how hackers think so you can harden your defenses against them?

Courses are delivered to you through expertly executed lessons, online instruction and interaction with like-minded students. Our courses are designed to deliver all of the benefits of studying in a classroom whilst giving you the flexibility to study at a time and place to suit your needs. You can access your classroom 24/7 from any device with an internet connection.

This course has a 3 month duration. You'll complete comprehensive lessons, quizzes and assignments before submitting your final exam at the end of the course to achieve your certificate. Courses must be completed within the 3 month access period.

If you've ever wondered about the different types of hackers, what motivates them, and when hacking is considered ethical, this lesson answers these questions and more! You'll learn about the white-, black-, and gray-hat hackers, why they hack, the methods they use, and the ethics of computing and hacking. You'll also get your feet wet by learning how to conduct a security audit on your network by trying to penetrate it just as a hacker would!

This is the lesson where you'll learn about people hacking! Social engineering is the official term for the physical and psychological methods hackers use to gain entry to your system. Intrigued? Good. Get ready to learn the insider techniques of how hackers gain information about your networks through preying on the weakest link in any organization—its employees!

If you've ever used the Google search engine to find information on the Internet, you know how powerful it is. Hackers know this too, and they have found a way to use the built-in power of Google to gather information about your network! By learning how the search engine works, you'll see why and how Google stores so much public and private information. Then, you'll learn how hackers extract this wealth of information and how they use it against you.

In this lesson, you'll learn advanced Google hacking techniques so that you can perform a Google hack for your security audit. Get a full list of advanced hacking operators and discover—in depth—the advanced method of querying Google. Through a step-by-step example, you'll see how a search query is performed and what results look like. And of course, you'll learn how to incorporate this hacking method into your own security audit!

Have you ever wondered what really goes on within your network? The OSI 7 Layer Network Model is the standard on which networks are built, so in order to fully understand how networks are hacked, you need to understand this model. But have no fear! You'll learn the purpose, function, and communication methods of each layer within the model. And I assure you it will be painless!

Have you ever wanted to see what kind of information your network is sending out into cyberspace? Well, it's all in the packets. Once you understand the OSI 7 Layer Network Model, you can now understand packets that travel across a network. It's in those packets that hackers can gain the most information about your network. You'll learn how communication between two networks takes place—from the initial handshake to the termination of the connection—and how you can capture packets from your network just as a hacker would.

Now that you've learned how a hacker scouts out your network and gains information, it would be nice to know from what direction they'll attack you from, won't it? Learn how to look for signs that your network has been exposed or penetrated. By understanding the levels of security, from vulnerability through exposure, you'll view a hack through the eyes of a real hacker.

We all know that common ports connect printers, USB devices, and the like. But, did you know that there are also ports hidden inside your computer? And more importantly, do you know how these hidden ports can endanger you if they are left exposed on your network? In this lesson, we'll look at a PC from the inside out. This lavishly illustrated lesson will help you understand what ports are, where they are located, and what they do. Then, it's a short step to understanding how leaving these ports open can result in a hacker learning the services and software running on your network.

While the term necessary evil is a cliché, we do have a few necessary evils in the computing world. In order to make networks function, sometimes we need to run programs that might not be good for our security. You'll need to learn to manage the risk involved with running these services by understanding what they do, how they operate, and what you can do to keep them from exposing your network core.

Get ready to learn about rootkits in this information-packed lesson! A hacker's best friend, these malicious programs run undetected in the background of your system, launching malicious attacks, sometimes even without your knowledge. It's both hard to find and hard to get rid of rootkits, so for the sake of your PC's security, get ready to apply this lesson today!

Have you ever analyzed your risk? In this lesson, you'll learn how to conduct a risk analysis in order to determine the most vulnerable points within your network. Hand in hand with the analysis is your audit plan, where you can probe your computer or network for the weakest links. And then, we'll talk about what to do once you've found them.

If you like forensics television shows like CSI, this lesson is for you. No PC security course could be complete without an introduction to computer forensics, which is a precise science used to contain security breaches and minimize loss in the event of an attack. Learn how to become a computer investigator so that you'll be prepared if a hacker ever violates your system.

Debbie Mahler

Debbie Mahler

Debbie Mahler teaches students at college and university level on a wide range of business-related topics.  She worked for nearly 15 years in the PC repair business, has a successful online IT business, has written six books, and writes for s... Read more

Read Debbie Mahler's Profile

Frequently Asked Questions

Once you've made the payment, we'll send you a confirmation email with a link to start your course. Feel free to get started whenever you're ready!

You'll have 3 months access to your course. In that time you are free to study at your own pace. The course duration is 24 hours.

Online learning is a flexible way to study that fits around your schedule, giving you the freedom to learn at your own pace from anywhere in the world. You'll have 3 months to complete the course and can take the multiple-choice questions and final exam whenever it suits you.

If you need help, you can contact us anytime. You can also join the discussion area where you can interact with other students. The discussion area for each lesson is open for the entire duration of the course.

Of course! We offer a 7-day money back guarantee. As long as you haven't completed the course, you can get a full refund within 7 days of enrolling.

We do not offer extensions or transfers for this self-paced course. However, you will have 3 months to complete the course, and if you need to cancel within the first 10 days of enrolment, we offer a money back guarantee.

The Learning Environment

From the moment that you enrol in the PC Security Advanced you will become an integral part of our learning community. You'll find yourself with the freedom to learn at a speed that suits you, on any device, from anywhere in the world. Achieving your career goals no longer has to mean compromising family and work commitments.

Our Values

Learn At Your Own Pace

We believe in personalised learning. That's why we provide all the tools and support you need to succeed at your own pace. With flexible learning, you'll stay motivated and retain more information. Plus, you can balance your studies with work and family commitments to make your dreams a reality.

We Won't Break The Bank

Education should be accessible to anyone who wants to learn. That's why we offer some of the most competitive prices in the industry with payments plans for just $25 per week. Investing in your future is a smart choice and doesn’t have to break the bank.

Industry-Led Courses

There's no better way to learn than from experts with years of experience in your field. That's why each of our 200+ industry-led courses are designed to give you a real-life perspective on your industry. With our expert mentors, you'll learn from people who have a wealth of knowledge and experience, and who are passionate about sharing it with you.

Get The Personal Support You Deserve

At Vibe Learning, we're real people who are dedicated to providing you with personal support every step of the way. Our industry experts are not only professional and knowledgeable but also incredibly passionate about sharing their expertise with you. With their guidance, you'll gain invaluable insights and practical knowledge to help you succeed.