Tags
Language
Tags
May 2025
Su Mo Tu We Th Fr Sa
27 28 29 30 1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Master Windows & Linux: Ultimate Admin Bootcamp (2024)

    Posted By: ELK1nG
    Master Windows & Linux: Ultimate Admin Bootcamp (2024)

    Master Windows & Linux: Ultimate Admin Bootcamp (2024)
    Published 8/2024
    MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
    Language: English | Size: 27.07 GB | Duration: 91h 40m

    IT Career Booster: Master AD, Linux, automation & security in Windows & Linux environments

    What you'll learn

    Master Windows Server administration, including Active Directory, Group Policy, and security best practices for enterprise environments.

    Gain proficiency in Linux system administration, covering command-line operations, user management, and network configuration.

    Develop advanced scripting skills in both PowerShell and Bash to automate tasks and enhance productivity across both platforms.

    Implement and manage high availability solutions, including clustering and load balancing, for Windows and Linux servers.

    Master essential security practices for both Windows and Linux, including hardening techniques, access control, and threat mitigation.

    And much more…

    Requirements

    Basic IT knowledge and familiarity with computer concepts. No prior experience with Windows Server or Linux is required, but basic computer skills and understanding of networking fundamentals will be helpful. A computer with internet access and the ability to set up virtual machines (8GB RAM recommended) is needed for hands-on practice. We'll guide you through all necessary software installations. This course is designed to take you from beginner to advanced, so come with an eagerness to learn and you'll be well-prepared for the course!

    Description

    Master Windows Server and Linux Administration: The Ultimate Hands-On GuideElevate your IT career with our comprehensive 90+ hour course covering essential skills for managing Windows Server and Linux environments. Perfect for aspiring system administrators and IT professionals looking to expand their expertise and unlock new career opportunities.Key highlights:• Dive deep into Windows Server administration, from installation to advanced features• Explore Active Directory, Group Policy, and security best practices • Learn Linux fundamentals and advanced concepts across popular distributions• Master PowerShell and Bash scripting for efficient system management• Hands-on labs and real-world scenarios to reinforce your learningLinux in the Modern World:Linux powers much of the world's technology infrastructure, from web servers and cloud platforms to mobile devices and embedded systems. Its open-source nature, stability, and flexibility make it a top choice for enterprises, startups, and governments alike. By mastering Linux, you'll position yourself at the forefront of technological innovation and open doors to exciting career opportunities in cloud computing, DevOps, IoT, and more.Windows Server in Enterprise Environments:Windows Server remains a cornerstone of enterprise IT infrastructure, providing essential services for businesses of all sizes. From managing user identities and access to hosting critical business applications, Windows Server skills are in high demand. Proficiency in Windows Server administration will make you an invaluable asset to organizations relying on Microsoft technologies.The Power of Mastering Both:By acquiring skills in both Windows Server and Linux administration, you'll become a versatile and highly sought-after IT professional. This unique combination allows you to:• Seamlessly navigate and integrate diverse IT environments• Implement robust, cross-platform solutions for complex business needs• Adapt quickly to evolving technology landscapes and job requirements• Stand out in the job market with a broader skill set than most candidates• Contribute effectively to hybrid cloud and multi-cloud strategies• Solve a wider range of IT challenges, making you indispensable to employersCareer Advancement and Opportunities:Completing this course will significantly enhance your career prospects in the IT industry:• Qualify for in-demand roles such as Systems Administrator, Network Administrator, or IT Infrastructure Specialist• Boost your earning potential - skilled Windows/Linux admins command competitive salaries• Prepare for sought-after certifications in both Microsoft and Linux domains• Position yourself for career growth into roles like IT Manager or Cloud Architect• Gain the versatility to work across diverse IT environments and industries• Develop a strong foundation for specializing in cloud technologies, DevOps, or cybersecurityBy the end of this course, you'll have the confidence and skills to:• Deploy and manage Windows Server and Linux systems in enterprise environments• Implement robust security measures and troubleshoot common issues• Automate tasks with PowerShell and Bash scripting• Tackle certification exams with ease• Impress employers with your broad skill set and hands-on experienceWhether you're new to system administration or looking to level up your skills, this course provides the perfect blend of theory and practical knowledge to succeed in today's IT landscape. Start your journey to becoming a versatile and in-demand IT professional today!Invest in your future - gain the skills that will set you apart in the competitive IT job market and open doors to exciting career opportunities.Brief Course Outline:1. Windows Server Administration   - Installation and configuration   - Active Directory and Group Policy   - Networking and storage management   - High availability and disaster recovery   - Security and performance optimization2. Linux Administration   - Linux fundamentals and command line mastery   - User and group management   - File system administration   - Network configuration and security   - Package management and software installation3. PowerShell Scripting   - PowerShell basics and syntax   - Writing and executing scripts   - Automating Windows Server tasks   - Managing Active Directory with PowerShell4. Bash Scripting   - Bash scripting fundamentals   - Creating and debugging scripts   - Automating Linux system administration tasks   - Text processing and data manipulation5. Advanced Topics   - Virtualization and containerization   - Cloud integration    - Configuration management tools (Ansible)   - Monitoring and loggingWhat You'll Learn:- Install, configure, and manage Windows Server and Linux systems- Implement and administer Active Directory services- Configure and maintain network services on both platforms- Manage storage solutions, including RAID and LVM- Implement security best practices and hardening techniques- Write powerful scripts in PowerShell and Bash for task automation- Deploy and manage virtual machines and containers- Implement high availability and disaster recovery solutions- Monitor system performance and troubleshoot common issues- Integrate on-premises systems with cloud services- Use configuration management tools for efficient system administrationBy the end of this course, you'll have a comprehensive skill set covering both Windows and Linux environments, positioning you as a versatile and valuable IT professional ready to take on the challenges of modern infrastructure management.

    Overview

    Section 1: Introduction

    Lecture 1 Instructor's Intro

    Lecture 2 Introduction and Installing Windows Server 2022

    Lecture 3 Activating Windows Server 2022

    Lecture 4 Post-Install Tasks. Part 1

    Lecture 5 Post-Install Tasks. Part 2

    Lecture 6 Setting a Base Image with SYSPREP

    Lecture 7 Recap

    Lecture 8 Setting up your first DC

    Lecture 9 Installing WAC and Joing a workstation to the domain

    Lecture 10 Server Core

    Lecture 11 Adding a Child Domain to the Lab

    Lecture 12 Recap: Base Lab SOP

    Lecture 13 AD DS Admin Tools

    Lecture 14 Creating Users in our Lab

    Lecture 15 Creating OU, Group, and User Template

    Lecture 16 Manging AD DS Objects with Powershell

    Lecture 17 Building Trusts between Forests

    Lecture 18 Server Manager

    Lecture 19 Getting started with Powershell

    Lecture 20 Installing Hyper-V in Windows Server Lab

    Lecture 21 Installing Hyper-V in Windows Server Lab. Part 2

    Lecture 22 Networking basics

    Lecture 23 Configuring Network Settings

    Lecture 24 Installing updates and upgrading Windows Server 2019 to 2022

    Lecture 25 Creating an automated answer file to automate the installation

    Lecture 26 Module 1: Installing and configuring domain controllers. Overview

    Lecture 27 AD DS components

    Lecture 28 What is the AD DS schema?

    Lecture 29 What is an AD DS forest?

    Lecture 30 What is an AD DS domain?

    Lecture 31 What are OUs?

    Lecture 32 What is Azure AD?

    Lecture 33 Overview of AD DS administration tools

    Lecture 34 Demo 1: Overview of AD DS administration tools and components

    Lecture 35 Demo 2: Overview of AD DS administration tools and components

    Lecture 36 Demo 3: Active Directory Administrative Center to administer and manage AD DS

    Lecture 37 Overview of AD DS domain controllers

    Lecture 38 What is a domain controller?

    Lecture 39 What is a global catalog?

    Lecture 40 Demo: What is a global catalog?

    Lecture 41 Overview of domain controller SRV records

    Lecture 42 Demo: Overview of domain controller SRV records

    Lecture 43 AD DS sign-in process

    Lecture 44 Demo: AD DS sign-in process

    Lecture 45 Demo: AD DS sign-in process

    Lecture 46 What are operations masters?

    Lecture 47 Transferring and seizing roles

    Lecture 48 Deploying a domain controller: Overview

    Lecture 49 Installing a domain controller from Server Manager

    Lecture 50 Demo: Part 1. Installing a domain controller from Server Manager

    Lecture 51 Demo: Part 2. Installing a domain controller from Server Manager

    Lecture 52 Installing a domain controller on a Server Core installation of Windows Server

    Lecture 53 Demo: Installing a domain controller on a Server Core

    Lecture 54 Installing a domain controller by installing from media

    Lecture 55 Cloning domain controllers

    Lecture 56 Demonstration: Cloning domain controllers

    Lecture 57 Demonstration: Adding Another domain controllers

    Lecture 58 Demonstration: Installing a domain controller with Powershell

    Lecture 59 Demonstration: FSMO Roles

    Section 2: Managing user accounts

    Lecture 60 Managing User Accounts Overview

    Lecture 61 Creating user accounts

    Lecture 62 Demo: Configuring user account attributes

    Lecture 63 Demo: Managing user accounts

    Lecture 64 Creating user profiles

    Lecture 65 Demo: Creating user profiles

    Lecture 66 Demo: User account templates

    Lecture 67 Using Windows PowerShell cmdlets to manage user accounts

    Lecture 68 Using Windows PowerShell to create users

    Lecture 69 Using Windows PowerShell for bulk users operations

    Lecture 70 Using Windows PowerShell to modify users' properties

    Lecture 71 Using Windows PowerShell to add users to groups

    Lecture 72 Using Windows PowerShell to modify users' properties. Part2

    Lecture 73 Using Windows PowerShell to enable/move users

    Lecture 74 Using Windows PowerShell to delete users

    Section 3: Managing groups, computers, OU in AD DS

    Lecture 75 Managing groups in AD DS Section Overview

    Lecture 76 Group types

    Lecture 77 Group types

    Lecture 78 Group scopes

    Lecture 79 Demo: Group scopes

    Lecture 80 Implementing group management

    Lecture 81 Demo: Implementing group management (IGDLA)

    Lecture 82 Managing members with GPO

    Lecture 83 Demo: Using Restricted Groups Setting

    Lecture 84 Default groups

    Lecture 85 Demo: Using Account Operators Groups and Delegate Control

    Lecture 86 Special identities

    Lecture 87 Demonstration: Managing groups in Windows Server

    Lecture 88 Demo: Checking Groups Membership

    Lecture 89 Managing computer objects in AD DS Section Overview

    Lecture 90 Specifying the location of computer accounts

    Lecture 91 Controlling permissions to create computer accounts

    Lecture 92 Joining a computer to a domain

    Lecture 93 Demo: Managing Computer Obejects

    Lecture 94 Resetting the computer account (secure channel)

    Lecture 95 Demo: Resetting the computer account (secure channel)

    Lecture 96 Performing an offline domain join

    Lecture 97 Lab Tasks: Managing objects in AD DS

    Lecture 98 Lab Solution: Managing objects in AD DS

    Lecture 99 Implementing and managing OUs Section Overview

    Lecture 100 Planning OUs

    Lecture 101 OU hierarchy considerations

    Lecture 102 Considerations for using OUs

    Lecture 103 AD DS permissions

    Lecture 104 Delegating AD DS permissions

    Lecture 105 Using Windows PowerShell for AD DS administration Section Overview

    Lecture 106 Using Windows PowerShell cmdlets to manage groups

    Lecture 107 PowerShell: Managing, configuring and modifying Group objects. Part 1

    Lecture 108 PowerShell: Managing, configuring and modifying Group objects. Part 2

    Lecture 109 PowerShell: Managing, configuring and modifying Group objects. Part 3

    Lecture 110 PowerShell: Managing, configuring and modifying Group objects. Part 4

    Lecture 111 PowerShell: Managing, configuring and modifying Group objects. Part 5

    Lecture 112 Windows PowerShell cmdlets to manage computers and OUs

    Lecture 113 PowerShell: Managing, configuring and modifying Computer objects. Part 1

    Lecture 114 PowerShell: Managing, configuring and modifying Computer objects. Part 2

    Section 4: Part 2

    Lecture 115 Course Overview

    Lecture 116 Section Overview

    Lecture 117 Overview of domain and forest boundaries in an AD DS structure

    Lecture 118 Why implement multiple domains?

    Lecture 119 Why implement multiple forests?

    Lecture 120 Deploying a domain controller in Azure IaaS

    Lecture 121 Managing objects in complex AD DS deployments

    Lecture 122 Deploying a distributed AD DS environment. Section Overview

    Lecture 123 AD DS domain functional levels

    Lecture 124 AD DS forest functional levels

    Lecture 125 Demo: New domain and functional levels in Windows Server 2025

    Lecture 126 Deploying new AD DS domains

    Lecture 127 Considerations for implementing complex AD DS environments

    Lecture 128 Demo: Installing a domain controller in a new domain in an existing forest

    Lecture 129 Upgrading a previous version of AD DS to Windows Server 2016

    Lecture 130 Migrating to Windows Server 2016 AD DS from a previous version

    Lecture 131 Configuring AD DS trusts. Section Overview

    Lecture 132 Overview of different AD DS trust types

    Lecture 133 How trusts work in a forest

    Lecture 134 How trusts work between forests

    Lecture 135 Configuring advanced AD DS trust settings

    Lecture 136 Course Overview

    Lecture 137 Section Overview

    Lecture 138 What are AD DS partitions?

    Lecture 139 Characteristics of AD DS replication

    Lecture 140 How AD DS replication works within a site

    Lecture 141 Resolving replication conflicts

    Lecture 142 How replication topology is generated

    Lecture 143 How SYSVOL replication works

    Lecture 144 Configuring AD DS sites Section Overview

    Lecture 145 What are AD DS sites?

    Lecture 146 Why implement additional sites?

    Lecture 147 How replication works between sites

    Lecture 148 What is the ISTG?

    Lecture 149 Overview of SRV records

    Lecture 150 How client computers locate domain controllers within sites

    Lecture 151 Moving domain controllers between sites

    Lecture 152 Configuring and monitoring AD DS replication Section Overview

    Lecture 153 What are AD DS site links?

    Lecture 154 What is site link bridging?

    Lecture 155 What is universal group membership caching?

    Lecture 156 Lab: Sites and Replication. Exercies and Tasks

    Lecture 157 Lab: Sites and Replication. Solution

    Section 5: Group Policy

    Lecture 158 Course Overview

    Lecture 159 What is Configuration Management

    Lecture 160 Overview of Group Policy tools and consoles

    Lecture 161 Computer Configuration and User Configuration

    Lecture 162 Demonstration: Exploring Group Policy tools and consoles

    Lecture 163 Benefits of using Group Policy

    Lecture 164 Group Policy Objects

    Lecture 165 Overview of GPO scope

    Lecture 166 Overview of GPO inheritance

    Lecture 167 The Group Policy Client service and client-side extensions

    Lecture 168 What are domain-based GPOs?

    Lecture 169 GPO storage

    Lecture 170 What are starter GPOs?

    Lecture 171 Common GPO management tasks

    Lecture 172 Delegating administration of Group Policy

    Lecture 173 Demo: Delegating administration of Group Policy

    Lecture 174 Lesson 3: Group Policy scope and Group Policy processing

    Lecture 175 What are GPO links?

    Lecture 176 Group Policy processing order

    Lecture 177 Configuring GPO inheritance and precedence

    Lecture 178 Using security filtering to modify Group Policy scope

    Lecture 179 What are WMI filters?

    Lecture 180 How to enable or disable GPOs and GPO nodes

    Lecture 181 Loopback policy processing

    Lecture 182 Considerations for slow links and disconnected systems

    Lecture 183 Identifying when settings become effective

    Lecture 184 Lab A Tasks: Implementing a Group Policy infrastructure

    Lecture 185 Lab A Solution: Implementing a Group Policy infrastructure

    Lecture 186 Troubleshooting the application of GPOs Lesson Overview

    Lecture 187 Refreshing GPOs

    Lecture 188 What is RSoP and Generating RSoP Report

    Lecture 189 Course Overview

    Lecture 190 Section Overview

    Lecture 191 What are administrative templates?

    Lecture 192 What are .adm and .admx files?

    Lecture 193 Overview of the central store

    Lecture 194 Demonstration: Configuring settings with administrative templates

    Lecture 195 Importing security templates

    Lecture 196 Managing administrative templates

    Lecture 197 Section Overview

    Lecture 198 What is Folder Redirection?

    Lecture 199 Settings for configuring Folder Redirection

    Lecture 200 Security settings for redirected folders

    Lecture 201 Demonstration: Configuring Folder Redirection

    Lecture 202 Managing software with Group Policy

    Lecture 203 Group Policy settings for applying scripts

    Lecture 204 Demonstration: Configuring scripts with GPOs

    Lecture 205 Section Overview

    Lecture 206 What are Group Policy preferences? Comparing with Policy settings

    Lecture 207 Features of Group Policy preferences

    Lecture 208 Item-level targeting options

    Lecture 209 Demonstration: Configuring Group Policy preferences

    Lecture 210 Lab Tasks: Managing user settings with Group Policy

    Lecture 211 Lab Solution: Managing user settings with Group Policy

    Lecture 212 Lab Review: Managing user settings with Group Policy

    Section 6: Securing domain controllers

    Lecture 213 Section Overview

    Lecture 214 Security risks that can affect domain controllers

    Lecture 215 Demo: Installing and Using Nmap for Network Scanning and Vulnerability Assess

    Lecture 216 Modifying the security settings of domain controllers

    Lecture 217 Demo Example 1: Configuring and Verifying Domain Controller Security Policies

    Lecture 218 Demo Example 2: Configuring Custom Security Policies for Domain Controllers

    Lecture 219 Benefits of Custom GPOs for Domain Controllers: Best Practices and Consideration

    Lecture 220 Implementing secure authentication

    Lecture 221 Securing physical access to domain controllers

    Lecture 222 What are RODCs?

    Lecture 223 Deploying an RODC

    Lecture 224 Planning and configuring an RODC password replication policy

    Lecture 225 Demonstration: Configuring a password replication policy

    Lecture 226 Separating RODC local administration

    Lecture 227 Best Practices for Securing Active Directory

    Lecture 228 Section Overview

    Lecture 229 Password policies

    Lecture 230 Account lockout policies

    Lecture 231 Kerberos policies

    Lecture 232 Demonstration: Configuring a fine-grained password policy

    Lecture 233 Protecting groups in AD DS

    Lecture 234 Fine-grained password and lockout policies

    Lecture 235 Tools for creating PSOs

    Lecture 236 Demonstration: Configuring authentication-related audit policies and viewing log

    Lecture 237 PSO precedence and resultant PSO

    Lecture 238 Account-security options

    Lecture 239 Configuring user account policies

    Lecture 240 Account logon and logon events skdlfdklsj lksdjflkdsjflkj lksdjfldsakjflkj dslkj

    Lecture 241 Demonstration: Configuring authentication-related audit policies and viewing log

    Lecture 242 Scoping audit policies

    Lecture 243 Section Overview

    Lecture 244 Overview of service accounts

    Lecture 245 Challenges of using service accounts

    Lecture 246 Overview of managed service accounts

    Lecture 247 What are group MSAs?

    Lecture 248 Demonstration: Configuring group MSAs

    Lecture 249 Lab: Securing AD DS Exercises and Tasks

    Lecture 250 Lab: Securing AD DS. Solution. Part 1

    Lecture 251 Lab: Securing AD DS. Solution. Part 2

    Lecture 252 Lab Review

    Lecture 253 Module Review and Takeaways

    Lecture 254 Plan Your Progress

    Lecture 255 Course Overview

    Lecture 256 Section Overview: Deploying CAs

    Lecture 257 What is AD CS?

    Lecture 258 Options for implementing CA hierarchies

    Lecture 259 Standalone vs. enterprise CAs

    Lecture 260 Considerations for deploying a root CA

    Lecture 261 Demonstration: Deploying an enterprise root CA

    Lecture 262 Considerations for deploying a subordinate CA

    Lecture 263 How to use the CAPolicy.inf file for installing a CA

    Lecture 264 Section Overview: Administering CAs

    Lecture 265 Managing CAs

    Lecture 266 Configuring CA security

    Lecture 267 Security roles for CA administration

    Lecture 268 Configuring CA policy and exit modules

    Lecture 269 Configuring CDPs and AIA locations

    Lecture 270 Demonstration: Configuring CA properties

    Lecture 271 Section Overview: Troubleshooting CAs

    Lecture 272 Renewing a CA certificate

    Lecture 273 Moving a root CA to another computer

    Lecture 274 Monitoring CA operations

    Lecture 275 Lab Task: Deploying and managing AD CS

    Lecture 276 Lab Demonstration Steps: Deploying and managing AD CS

    Lecture 277 Course Overview

    Lecture 278 Course Overview

    Lecture 279 Section Overview

    Lecture 280 What are certificates and certificate templates

    Lecture 281 Certificate template versions in Windows Server

    Lecture 282 Configuring certificate template permissions

    Lecture 283 Configuring certificate template settings

    Lecture 284 Options for updating a certificate template

    Lecture 285 Demonstration: Modifying and enabling a certificate template

    Lecture 286 Assess Your Knowledge. Section Overview: Managing certificate

    Lecture 287 Certificate enrollment methods

    Lecture 288 Overview of certificate autoenrollment

    Lecture 289 What is an enrollment agent?

    Lecture 290 How does certificate revocation work?

    Lecture 291 Overview of key archival and recovery

    Lecture 292 Demonstration: Configuring a CA for key archival

    Lecture 293 Using certificates for SSL

    Lecture 294 Using certificates for digital signatures

    Lecture 295 Using certificates for content encryption

    Lecture 296 Demonstration: Signing a document digitally. Encrypting a file

    Lecture 297 Lab: Deploying and using certificates

    Lecture 298 Lab Demonstration Steps: Deploying and using certificates

    Lecture 299 Module Review and Takeaways

    Lecture 300 Building a PKI Lab Environment with Hyper-V and Base Image

    Lecture 301 Configuring Offline Root Certification Authority

    Lecture 302 Configuring Root CA Settings

    Lecture 303 Installing IIS Web Server and Importing Root CA Certificate

    Lecture 304 Configuring IIS Virtual Directory and Settings for PKI

    Lecture 305 Setting Up an Enterprise Subordinate Certification Authority

    Lecture 306 Configuring CRL and AIA Distribution Points on Subordinate CA

    Lecture 307 Building a PKI infrastructure lab on Windows Server Core VMs

    Lecture 308 Building a PKI infrastructure lab on Windows Server Core VMs.

    Lecture 309 Building a PKI infrastructure lab on Windows Server Core VMs.

    Lecture 310 Managing disks in Windows Server

    Lecture 311 Selecting a disk type

    Lecture 312 Selecting a file system

    Lecture 313 Implementing ReFS

    Lecture 314 Implementing ReFS with Powershell

    Lecture 315 Using .vhd and .vhdx file types

    Lecture 316 Using .vhd and .vhdx file types

    Lecture 317 Working with Dynamic Volumes

    Lecture 318 Working with Diskpart

    Lecture 319 Lab Assignment: Configuring Local Storage

    Lecture 320 Lab Solution: Configuring Local Storage

    Lecture 321 Selecting a disk type

    Lecture 322 What is RAID?

    Lecture 323 RAID levels

    Lecture 324 What is DAS?

    Lecture 325 What is NAS?

    Lecture 326 What is a SAN?

    Lecture 327 Comparison and scenarios for usage

    Lecture 328 Block-level storage vs. file-level storage

    Lecture 329 What is Fibre Channel?

    Lecture 330 Considerations for implementing Fibre Channel

    Lecture 331 What is iSCSI?

    Lecture 332 iSCSI components

    Lecture 333 Core storage components

    Lecture 334 Demo: Configuring an iSCSI target

    Lecture 335 What is iSNS?

    Lecture 336 What is DCB?

    Lecture 337 What is MPIO?

    Lecture 338 Demo: Configuring MPIO

    Lecture 339 What is SMB?

    Lecture 340 Configuring SMB shares

    Lecture 341 Demo: Configuring SMB shares by using Server Manager and

    Lecture 342 What is NFS?

    Lecture 343 Configuring NFS shares

    Lecture 344 Demo: Configuring an NFS share by using Server Manager

    Lecture 345 Lab Assignment: Implementing enterprise storage solutions

    Lecture 346 Lab Solution: Implementing enterprise storage solutions

    Lecture 347 Enterprise storage needs

    Lecture 348 What are Storage Spaces?

    Lecture 349 Components and features of Storage Spaces

    Lecture 350 Demonstration: Configuring Storage Spaces

    Lecture 351 Changes to file and storage services in Windows Server

    Lecture 352 Storage Spaces usage scenarios

    Lecture 353 Discussion: Comparing Storage Spaces to other storage sol

    Lecture 354 Managing Storage Spaces

    Lecture 355 Managing disk failure with Storage Spaces

    Lecture 356 Storage pool expansion

    Lecture 357 Demonstration: Managing Storage Spaces by using Windows P

    Lecture 358 Event logs and performance counters

    Lecture 359 Event logs and performance counters. Part 2

    Lecture 360 Performance counters

    Lecture 361 Lab A Tasks: Implementing Storage Spaces. Execrcise 1

    Lecture 362 Lab A Tasks: Implementing Storage Spaces. Execrcise 2

    Lecture 363 Lab A Solution: Implementing Storage Spaces. Execrcise 1

    Lecture 364 Lab A Solution: Implementing Storage Spaces. Execrcise 2

    Lecture 365 What is Data Deduplication?

    Lecture 366 Data Deduplication components

    Lecture 367 Deploying Data Deduplication

    Lecture 368 Usage scenarios for Data Deduplication

    Lecture 369 Monitoring and maintaining Data Deduplication

    Lecture 370 Backup and restore considerations with Data Deduplication

    Lecture 371 Lab B Tasks: Implementing Data Deduplication

    Lecture 372 Lab B Tasks: Implementing Data Deduplication

    Lecture 373 Lab B Solution: Implementing Data Deduplication

    Lecture 374 Module Introduction

    Lecture 375 New Hyper-V host features in Windows Server

    Lecture 376 New Hyper-V virtual machine features

    Lecture 377 Lesson 3: Configuring storage on Hyper-V host servers

    Lecture 378 Considerations for virtual hard disk formats and types

    Lecture 379 Demo: Managing storage in Hyper-V

    Lecture 380 Lesson 4: Types of Hyper-V networks

    Lecture 381 Best Practices for configuring Hyper-V virtual networks

    Lecture 382 New Hyper-V networking features in Windows Server

    Lecture 383 Demo: Configuring Hyper-V networks

    Lecture 384 Lesson 5: Configuring Hyper-V virtual machines

    Lecture 385 Virtual machine generation versions

    Lecture 386 Virtual machine settings

    Lecture 387 VMs features and best practice

    Lecture 388 Demo: Virtual machine configuration versions

    Lecture 389 Demo: Creating a virtual machine

    Lecture 390 Demo: Creating a virtual machine with Powershell

    Lecture 391 Lesson 6: Managing virtual machines

    Lecture 392 Managing checkpoints

    Lecture 393 Demo: Creating checkpoints

    Lecture 394 Importing and exporting virtual machines

    Lecture 395 Demo: Live migration of a virtual machine

    Lecture 396 What is Docker?

    Lecture 397 Demo: Installing Docker

    Lecture 398 Module Overview

    Lecture 399 What is high availability?

    Lecture 400 What is continuous and availability?

    Lecture 401 Creating a disaster recovery plan

    Lecture 402 Highly available networking and storage

    Lecture 403 Lesson 2: Planning high availability and disaster recover

    Lecture 404 High availability considerations with Hyper-V virtual mac

    Lecture 405 Overview of Live Migration

    Lecture 406 Providing high availability with storage migration

    Lecture 407 Demo: Configuring live migration

    Lecture 408 Overview of Hyper-V Replica

    Lecture 409 Demo: Configuring storage migration. Implementing Hyper-V

    Lecture 410 Lesson 3: Backing up and restoring by using Windows Serve

    Lecture 411 Lesson 4: High Availability with failover clustering in W

    Lecture 412 What is failover clustering?

    Lecture 413 Course Introduction

    Lecture 414 Key Considerations for Designing a Highly Available Failo

    Lecture 415 Identifying and Preparing Applications for Failover Clust

    Lecture 416 Storage Options and Requirements for Failover Clusters

    Lecture 417 Hardware and Network Requirements for Failover Clustering

    Lecture 418 Configuring Software, Security, and Migration for Failove

    Lecture 419 Cluster Configuration: Properties, Nodes, and Failover/Fa

    Lecture 420 Quorum Modes and Configuration in Failover Clustering

    Lecture 421 Deploying and Configuring Failover Clusters

    Lecture 422 Demo: Creating a failover cluster

    Lecture 423 Configuring Storage and Networking for Failover Clusters

    Lecture 424 Setting Up and Administering Failover Clustering Roles

    Lecture 425 Demo: Creating a general file-server failover cluster

    Lecture 426 Configuring Cluster Quorum Settings

    Lecture 427 Demo: Configuring the quorum

    Lecture 428 Monitoring, Backing Up, and Maintaining Failover Clusters

    Lecture 429 Demo: Configure failover and failback settings

    Lecture 430 Failover Cluster Maintenance - Backup, Recovery, and Trou

    Lecture 431 Optimizing Network Thresholds and Monitoring for Cluster

    Lecture 432 Zero Downtime OS Updates Using Cluster-Aware Updating

    Lecture 433 Demo: Configuring CAU

    Lecture 434 Identifying and Resolving Failover Cluster Communication

    Lecture 435 Troubleshooting Cluster Availability Issues Related to CN

    Lecture 436 Monitoring and Diagnostic Tools for Failover Cluster Mana

    Lecture 437 Deploying Stretch Clusters for Site Resiliency

    Lecture 438 Deploying Highly Available Stretched Clusters Across Loca

    Lecture 439 Understanding Synchronous vs Asynchronous Replication for

    Lecture 440 Using Storage Replica for Stretched Clusters and Replicat

    Lecture 441 Witness Selection for Site-Aware Stretched Failover Clust

    Lecture 442 Implementing Site-Aware Failover Clustering

    Lecture 443 Failover and Failback Procedures for Stretched Clusters

    Lecture 444 Course intro

    Lecture 445 What is NLB?

    Lecture 446 Deployment requirements for NLB

    Lecture 447 Network considerations for NLB

    Lecture 448 Configuration options for NLB

    Lecture 449 Designing applications and storage support for NLB

    Lecture 450 Considerations for deploying an NLB cluster on virtual ma

    Lecture 451 Considerations for securing NLB

    Lecture 452 Considerations for scaling and upgrading NLB

    Lecture 453 Demo: Implementing NLB

    Lecture 454 Introduction

    Lecture 455 Hands-On Lab Overview

    Lecture 456 Hands-On Lab Part 1

    Lecture 457 Hands-On Lab Part 2

    Lecture 458 Hands-On Lab Part 3

    Lecture 459 Hands-On Lab Part 4

    Section 7: Linux

    Lecture 460 Changing the directories, inspecting the system, examinin

    Lecture 461 Displaying and setting time and date. Part 1

    Lecture 462 Displaying and setting time and date. Part 2

    Lecture 463 Getting device information and using compression/archivin

    Lecture 464 Getting help (continued)

    Lecture 465 Path and file types

    Lecture 466 Creating files or directories and listing files or direct

    Lecture 467 Copying, moving, renaming, removing files and directories

    Lecture 468 File and directory control attributes

    Lecture 469 Finding files. Part 1

    Lecture 470 Finding files. Part 2

    Lecture 471 Finding files. Part 3

    Lecture 472 Finding files. Part 4

    Lecture 473 Hands-On Task Demo: Finding Large Files and Creating a Lo

    Lecture 474 File permissions. Part 1

    Lecture 475 File permissions. Part 2

    Lecture 476 Permissions for group collaboration

    Lecture 477 Hands-On Task Demo: Configuring Linux Permissions for a D

    Lecture 478 Getting Started with Vim Basics

    Lecture 479 Creating, opening and saving a file. Moving around VIM ed

    Lecture 480 Getting help in VIM

    Lecture 481 Creating the first file in vim

    Lecture 482 Basic vim commands

    Lecture 483 VIM motion commands and search

    Lecture 484 Opening and saving files in VIM

    Lecture 485 Opening multiple files and splitting windows

    Lecture 486 Switching between windows

    Lecture 487 Introduction to Basic Navigation in Vim

    Lecture 488 Hands-on Practice: Vim Installation and Basic Navigation

    Lecture 489 Fundamentals of Editing in Vim

    Lecture 490 Basic Vim Navigation

    Lecture 491 Advanced Vim Navigation

    Lecture 492 Vim Search and Replace

    Lecture 493 Vim Copy and Insert

    Lecture 494 Vim Fundamentals: A Comprehensive Review of Core Concepts

    Lecture 495 Overview of Exercise Lessons. What will we learn?

    Lecture 496 Exercise 1: Editing in Vim

    Lecture 497 Exercise 2: Editing in Vim

    Lecture 498 Exercise 3: Editing in Vim

    Lecture 499 Navigating and Editing Multiple Files in Vim

    Lecture 500 Advanced Vim Techniques for Managing Multiple Files

    Lecture 501 Searching the needed info with grep&wc

    Lecture 502 Cat and output redirection

    Lecture 503 Using pipes

    Lecture 504 Processes revealed

    Lecture 505 Processes and jobs

    Lecture 506 Exploring all running processes with top command

    Lecture 507 Understanding process states

    Lecture 508 Changing process priority with nice

    Lecture 509 Controlling processes with signals

    Lecture 510 Changing password with passwd and working withPATH

    Lecture 511 Special characters and command-line keystrokes

    Lecture 512 Chaining operators

    Lecture 513 Sed and awk

    Lecture 514 Sed and awk. Part 2

    Lecture 515 Performing exit, reboot or shutdown on the system

    Lecture 516 Using BASH history

    Lecture 517 Using aliases to create your own commands

    Lecture 518 Watching files and how they're changing live with watch c

    Lecture 519 Gaining administrative privileges with sudo command

    Lecture 520 Understanding Job Scheduling with cron and at commnds

    Lecture 521 Packages overview

    Lecture 522 Managing packages with rpm command

    Lecture 523 Installing and modifying packages with rpm command

    Lecture 524 Viewing pgp keys and verifying package attributes

    Lecture 525 YUM package manager. Part 1

    Lecture 526 YUM package manager. Part 2

    Lecture 527 YUM package manager. Part 3

    Lecture 528 Configuring hostname

    Lecture 529 IPv4 concepts and traceroute command usage

    Lecture 530 Using 'ip' command

    Lecture 531 Validating and Troubleshooting Network Configuration

    Lecture 532 Practice Lab: Examining Network Configuration

    Lecture 533 Configuring Networking with nmcli

    Lecture 534 Validating Network Configuration (with Guided Exercise)(

    Lecture 535 Editing Network Configuration Files (with Guided Exercise

    Lecture 536 Lab: Managing Networking

    Lecture 537 Installing RHEL9

    Lecture 538 Registering RHEL9

    Lecture 539 Users: Intro, id command, passwd file

    Lecture 540 Users: Gaining Superuser Access. su and sudo commands

    Lecture 541 Users: Configuring sudo

    Lecture 542 Users: Guided Exercise Using sudo

    Lecture 543 Users: Using useradd, userdel and usermod

    Lecture 544 Users: Practice excersise with useradd, userdel and userm

    Lecture 545 Groups: groupadd, groupdel and groupmod

    Lecture 546 Groups: adding users to groups

    Lecture 547 Users: working with passwords

    Lecture 548 Users: Practice. Working with passwords

    Lecture 549 Lab: Managing Users and Groups

    Lecture 550 File permissions

    Lecture 551 Changing Permissions for Files and Directories

    Lecture 552 Changing Ownership for Files and Directories

    Lecture 553 Guided Exercise: Managing File System Permissions from th

    Lecture 554 Umask and Managing Default Permissions and File Access

    Lecture 555 Guided Exercise: Umask and Managing Default Permissions

    Lecture 556 Lab: Controlling Access to Files

    Lecture 557 Listing Processes and Process States. PS command options

    Lecture 558 Controlling Jobs

    Lecture 559 Guided Exercise: Controlling Jobs

    Lecture 560 Killing Processes

    Lecture 561 Monitoring process activity

    Lecture 562 Lab: Monitoring and Managing Processes

    Lecture 563 Controlling Services and Daemons

    Lecture 564 Controlling Services and Daemons: Guided Exercises

    Lecture 565 Accessing Comand Line with SSH

    Lecture 566 Configuring SSH key-based authentication

    Lecture 567 Configuring and securing SSH

    Lecture 568 Describing System Log Architechture

    Lecture 569 Reviewing Syslog Files

    Lecture 570 Reviewing System Journal Entries

    Lecture 571 Preserving the System Journal

    Lecture 572 Maintaining Accurate Time

    Lecture 573 Lab: Analyzing and Storing Logs

    Lecture 574 Archiving and Compressing Files

    Lecture 575 Transferring Files Between Systems Securely

    Lecture 576 Using 'at' Package

    Lecture 577 Scheduling Recurring Tasks with 'crontab'

    Lecture 578 Scheduling Recurring System Jobs

    Lecture 579 Guided Exercise: Scheduling Recurring System Jobs

    Lecture 580 Managing Temporary Files

    Lecture 581 Guided Exercise: Managing Temporary Files

    Lecture 582 Adjusting Tuning Profiles

    Lecture 583 Adjusting Process Scheduling

    Lecture 584 Guided Exercise: Changing Process Scheduling

    Lecture 585 Interpreting File ACLs

    Lecture 586 Securing Files with ACLs

    Lecture 587 Guided Exercise: Securing Files with ACLs

    Lecture 588 Adding Partitions, File Systems, and Persistent Mounts

    Lecture 589 Guided Exercise: Adding Partitions, File Systems, and Per

    Lecture 590 Managing Swap Space

    Lecture 591 Lab: Managing Basic Storage

    Lecture 592 Managing Logical Volumes

    Lecture 593 Extending Logical Volumes

    Lecture 594 Guided Exercise: Extending Logical Volumes

    Lecture 595 Lab: Managing Logical Volumes

    Lecture 596 Managing Layered Storage with Stratis

    Lecture 597 Guided Exercise: Managing Layered Storage with Stratis

    Lecture 598 Compresson and Deduplicating Storage with VDO

    Lecture 599 Lab: Implementing Advanced Stirage Features

    Lecture 600 Accessing Network-Attached Storage

    Lecture 601 Guided Exercise: Accessing Network-Attached Storage

    Lecture 602 Describing the Boot Process

    Lecture 603 Guided Exercise: Selecting the Boot Target

    Lecture 604 Guided Exercise:Resetting the Root Password. Using Debug

    Lecture 605 Lab: Controlling the Boot Process

    Lecture 606 Describing Networking Concepts

    Lecture 607 IPv4 settings. Defining subnets

    Lecture 608 IPv4 Guided Exercises. Public and Private Adresses

    Lecture 609 Lab: Planning an IPv4 network

    Lecture 610 Using OpenSSL on Red Hat Linux to Create, Operate, and Se

    Lecture 611 Creating Certificate Authority (Self-Signed)

    Lecture 612 Hands-On Lab on OpenSSL

    Lecture 613 Administration and Monitoring with udevadm

    Lecture 614 UDEV Configuration and Device Management

    Lecture 615 Kernel Module Management: Using modprobe and rmmod

    Lecture 616 Installation and Package Management Troubleshooting

    Lecture 617 USB Device Detection and Management in Linux: Using lsusb

    Lecture 618 Using dmesg for System Monitoring and Troubleshooting in

    Lecture 619 Understanding Linux Run Levels: System Maintenance and Tr

    Lecture 620 Questions 1 -2: Using 'udevadm' and '/proc'

    Lecture 621 Questions 3 -4: udev Configuration Location. Loading kern

    Lecture 622 Questions 5- 6. Querying udev database. Listing USB devic

    Lecture 623 Question 7: Using dmesg to view kernel ring buffer

    Lecture 624 Writing Simple Bash Scripts

    Lecture 625 Guided Exercise: Writing Your First Script

    Lecture 626 Using Loops

    Lecture 627 Guided Exercise: Using Loops

    Lecture 628 Describing a Simple Regular Expression

    Lecture 629 Guided Exercise: Using grep with RegEx

    Lecture 630 Using grep with RegEx

    Lecture 631 Lab: Your First Script

    Lecture 632 Building Scripts: Using Variables and Redirecting Input/O

    Lecture 633 Building Scripts: the if-then statements

    Lecture 634 Building Scripts: Trying the Test command. Using Comparis

    Lecture 635 Building Scripts: Using File Comparison

    Lecture 636 Compound Testing. Working wit Advanced If-Then Statements

    Lecture 637 A Practical Example

    Lecture 638 Looping with the 'for' statement

    Lecture 639 Looping with the 'for' statement. Part 2

    Lecture 640 Using 'while' and 'until' commands. Using Loops

    Lecture 641 Using Loops. Part 2

    Lecture 642 Practical Examples Using Loops

    Lecture 643 Passing Parameters

    Lecture 644 Using Special Parameter Variables

    Lecture 645 Working with Options

    Lecture 646 Using Read Command

    Lecture 647 A Practical Example

    Lecture 648 Understanding Input and Output

    Lecture 649 Redirecting Output in Scripts

    Lecture 650 Read/Write file descriptors

    Lecture 651 Supressing Command Output. Using temp files. Logging Mess

    Lecture 652 A practical example: using input and output

    Lecture 653 Signaling the Bash shell

    Lecture 654 Using traps

    Lecture 655 Running scripts in background

    Lecture 656 Running Scripts without a Hang-up

    Lecture 657 Controlling the Job. Viewing Jobs

    Lecture 658 Your First Bash Script. Part 1

    Lecture 659 Your First Bash Script. Part 2

    Lecture 660 Bash Syntax Fundamentals. Part 1

    Lecture 661 Bash Syntax Fundamentals. Part 2

    Lecture 662 Bash Syntax Fundamentals. Part 3

    Lecture 663 Working with Files and Permissions. Part 1

    Lecture 664 Working with Files and Permissions. Part 2

    Lecture 665 Working with Files and Permissions. Part 3

    Lecture 666 Script Example: File Operations and Bash Concepts

    Lecture 667 'if' Statement. Part 1

    Lecture 668 'if' Statement. Part 2

    Lecture 669 Loops in Bash. Part 1

    Lecture 670 Loops in Bash. Part 2

    Lecture 671 Hands-on Lab: Interactive Menu Script. Part 1

    Lecture 672 Hands-on Lab: Interactive Menu Script. Part 2

    Lecture 673 Hands-on Lab: Linux Administration Interactive Menu Scrip

    Lecture 674 Hands-on Lab: Linux Administration Interactive Menu Scrip

    Lecture 675 Functions in Bash. Part 1

    Lecture 676 Functions in Bash. Part 2

    Lecture 677 Error Handling and Debugging in Bash. Part 1

    Lecture 678 Error Handling and Debugging in Bash. Part 2

    Lecture 679 Error Handling and Debugging in Bash. Part 3

    Lecture 680 Advanced Bash Scripting Techniques - Examples Explained.

    Lecture 681 Advanced Bash Scripting Techniques - Examples Explained.

    Lecture 682 Advanced Bash Scripting Techniques - Examples Explained.

    Lecture 683 Advanced Bash Scripting Techniques - Practical Example Wa

    Lecture 684 Bash Script Optimization and Performance. Part 1

    Lecture 685 Bash Script Optimization and Performance. Part 2

    Lecture 686 Bash Script Optimization and Performance. Part 3

    Lecture 687 Bash Script Optimization and Performance. Part 4

    Lecture 688 Bash Script Optimization and Performance. Practical Examp

    Lecture 689 Intro to Vagrant

    Lecture 690 Getting Installed

    Lecture 691 Using Vagrant

    Lecture 692 Using Vagrant. Part 2

    Lecture 693 Using Vagrant. Part 3

    Lecture 694 Using Vagrant. Part 4

    Lecture 695 Using Vagrant. Part 5

    Lecture 696 Using Vagrant. Part 6

    Lecture 697 Using Vagrant. Part 7

    Lecture 698 Using Vagrant. Part 8

    Lecture 699 Creating VM in RHEL cockpit

    Lecture 700 Configuring VMs

    Lecture 701 Configuring the prerequisites on managed hosts

    Lecture 702 Setting up SSH Key-based Authentication

    Lecture 703 What is an Ansible Inventory?

    Lecture 704 Building an Ansible Inventory

    Lecture 705 Using Ansible Ad-Hoc Commands

    Lecture 706 Ansible Ad-Hoc Commands: A Practical Demonstration

    Lecture 707 Guided Exercise: Ansible Ad-Hoc Commands in Practice

    Lecture 708 Intro to Ansible

    Lecture 709 Getting Installed

    Lecture 710 Configuring SSH

    Lecture 711 Getting inventory

    Lecture 712 Using modules

    Lecture 713 Starting with Playbooks

    Lecture 714 Starting with Playbooks. Part 2

    Lecture 715 Starting with Playbooks. Part 3

    Lecture 716 Starting with Playbooks. Part 4

    Lecture 717 Building Ansible Lab Environment

    Lecture 718 Describing Ansible Inventory Files

    Lecture 719 Guided Exercise: Ansible Inventory Files

    Lecture 720 Managing Ansible Configuaration Files

    Lecture 721 Managing Connectivity and Configuaration Files

    Lecture 722 Guided Exercise: Managing Ansible Configuaration Files

    Lecture 723 Running Ad Hoc Commands

    Lecture 724 Guided Exercise: Running Ad Hoc Commands

    Lecture 725 Lab: Deploying Ansible

    Lecture 726 Implementing Playbooks

    Lecture 727 Guided Exercise: Implementing Playbooks

    Lecture 728 Multiple Plays

    Lecture 729 Guided Exercise: Multiple Plays

    Lecture 730 Lab: Implementing Playbooks

    Lecture 731 Managing Variables

    Lecture 732 Guided Exercise: Managing Variables

    Lecture 733 Managing Secrets

    Lecture 734 Guided Exercise: Managing Secrets

    Lecture 735 Managing Facts

    Lecture 736 Guided Exercise: Managing Facts

    Lecture 737 Lab: Managing Variables and Facts

    Lecture 738 Writing Loops and Conditional Tasks

    Lecture 739 Guided Exercise: Writing Loops and Conditional Tasks

    Lecture 740 Implementing Handlers

    Lecture 741 Handling Task Failure

    Lecture 742 Guided Exercise: Handling Task Failure

    Lecture 743 Guided Lab:Implementing Task Control

    Lecture 744 Intro

    Lecture 745 Getting Installed

    Lecture 746 Configuring Git

    Lecture 747 Your First Commit

    Lecture 748 Using Push

    Lecture 749 Clone and Pull

    Lecture 750 Use Ignore

    Lecture 751 History

    Lecture 752 Use Branches

    Section 8: Powershell

    Lecture 753 Course overview

    Lecture 754 Overview of Part 1

    Lecture 755 Powershell Overview

    Lecture 756 Powershell Versions

    Lecture 757 Get to know Two Host Applications

    Lecture 758 What Version are You Using

    Lecture 759 Always Run the Shell as Administrator

    Lecture 760 Tips and Tricks

    Lecture 761 Configuring the Console

    Lecture 762 Configuring the Console (demo)

    Lecture 763 Configuring the ISE

    Lecture 764 Configuring the ISE (demo)

    Lecture 765 LAB 1 Exercise 1

    Lecture 766 LAB 1 Exercise 1 Answer Video

    Lecture 767 LAB 1 Exercise 2

    Lecture 768 LAB 1 Exercise 2 Answer Video

    Lecture 769 LAB Review

    Lecture 770 Part 2 Overview

    Lecture 771 Commands that Seem Familiar

    Lecture 772 Learning Commands Syntax

    Lecture 773 Viewing Help (demo)

    Lecture 774 Finding Commands

    Lecture 775 Finding Commands (demo)

    Lecture 776 Interpreting Help

    Lecture 777 Updating Help

    Lecture 778 Updating and saving help files

    Lecture 779 Demo: Updating and saving help files

    Lecture 780 About Files

    Lecture 781 About Files (demo)

    Lecture 782 Part 3 Overview

    Lecture 783 Full Command Syntax

    Lecture 784 Specifying Multiple Parameter Value

    Lecture 785 Shortened Command Syntax

    Lecture 786 Show-Command Command

    Lecture 787 Commands that Modify the System

    Lecture 788 Show-Command (demo)

    Lecture 789 Commands that Modify the System (demo)

    Lecture 790 Lab B: Finding and Running Basic Commands Tasks

    Lecture 791 Lab B Solution: Finding and Running Basic Commands

    Lecture 792 Module Review and Takeaways

    Lecture 793 Course overview

    Lecture 794 Part 1 Overview

    Lecture 795 Understanding the Pipeline. Part 1. Lesson 1

    Lecture 796 Understanding the Pipeline. Part 1. Lesson 2

    Lecture 797 Understanding the Pipeline. Part 1. Lesson 3

    Lecture 798 Understanding the Pipeline. Part 1. Lesson 4

    Lecture 799 Understanding the Pipeline. Part 1. Lesson 5

    Lecture 800 Understanding the Pipeline. Part 1. Lesson 6

    T professionals and aspiring system administrators looking to advance their careers by mastering both Windows Server and Linux administration skills.,Recent IT graduates or career changers aiming to build a strong foundation in enterprise-level server administration across multiple operating systems.,Experienced Windows administrators looking to add Linux skills to their repertoire, or Linux admins wanting to become proficient in Windows Server environments.,Network administrators seeking to expand their expertise to include cross-platform server management and automation techniques.