We guarantee that all our online courses will meet or exceed your
expectations. If you are not fully satisfied with a course - for
any reason at all - simply request a full refund. We guarantee no
hassles. That's our promise to you.
Go ahead and order with confidence!
| Introduction to Linux | |||
| Protected: Introduction to Linux | |||
| Protected: Linux distributions explained | |||
| Linux Installation | |||
| Protected: VirtualBox installation and virtual machine setup | |||
| Ubuntu Linux installation in a virtual machine | |||
| Ubuntu Linux setup in a virtual machine continued | |||
| Protected: First bootup into Linux | |||
| Protected: VirtualBox Guest Additions | |||
| Ubuntu desktop customization | |||
| Protected: Unity Tweak Tool | |||
| Installing Linux alongside Windows (dual boot) | |||
| Protected: Dual boot setup continued | |||
| Linux Command Line Interface (CLI) Essentials | |||
| Introduction to the Linux command line interface (CLI) | |||
| Navigating directories with the ls command | |||
| Administrator privileges in terminal | |||
| Using the package manager to install new applications | |||
| Protected: Searching through the repositories to find new applications to download | |||
| Installing packages which are not located in the repositores | |||
| Keeping programs updated via terminal | |||
| File permissions and ownership explained | |||
| File permissions and ownership continued | |||
| Protected: Creating new files using the touch command.mp4 | |||
| Protected: Creating new directories and moving files | |||
| Copying, renaming, and removing files.mp4 | |||
| Advanced CLI Usage | |||
| The find command and it’s practical uses | |||
| Protected: The find command and it’s practical uses continued | |||
| Protected: Find command final thoughts | |||
| Using the grep command to find information within files | |||
| Using grep in conjunction with the find command | |||
| How to redirect the output of a command | |||
| Using the top command to view applications in real time | |||
| Protected: Viewing the entire list of open processes and closing applications via terminal | |||
| Services explained | |||
| Configuring services via terminal | |||
| Protected: Using crontabs to schedule tasks | |||
| Crontab practical applications | |||
| Linux Development Tools | |||
| Protected: Choosing an integrated development environment (IDE) | |||
| Protected: Eclipse installation and setup | |||
| Protected: PyCharm installation and setup | |||
| Protected: PyCharm installation problem resolved | |||
| Protected: GitHub installation and how to setup a repository | |||
| How to push and pull information from our repository | |||
| How to remove and ignore directories in our repository.mp4 | |||
| How to resolve merge conflicts | |||
| How to setup and manage branches | |||
| Correction from previous lecture | |||
| Web Development Project | |||
| Getting started with Meteor | |||
| Setting up our Meteor project | |||
| Protected: Setting up our router and React components | |||
| Watch as our Meteor project begins to take form | |||
| Getting into the programming of our Meteor app | |||
| Rendering our blog posts | |||
| Putting the finishing touches on our Meteor app | |||
| Web Server Setup, Host Cofiguration and App Deployment | |||
| Protected: Apache 2, PHP 5, and MySQL setup | |||
| Server configuration | |||
| Protected: Linux hosts file | |||
| Deploying our Meteor to our Apache 2 server | |||
| Protected: Setting up our MongoDB NoSQL database | |||
| Protected: Setting up our virtual host | |||
| Protected: Using a shell script to set our environment variables | |||
| Protected: Installing and configuring phpMyAdmin | |||
| Let’s take a tour around the phpMyAdmin panel | |||
| Protected: Creating a basic virtual host | |||
| Protected: Setting up a WordPress installation on top of our Apache 2 environment | |||
| Protected: Before using WordPress we need to setup our database | |||
| Protected: Python installation and command line interface | |||
| Why is Python 3 worth learning | |||
| Linux User Management | |||
| Protected: Adding and removing users through the graphical user interface (GUI) | |||
| Protected: Adding new users through terminal.mp4 | |||
| Protected: How to delete users through terminal | |||
| How to change an exsisting user’s password | |||
| Adding users to a group and why this is valuable | |||
| Linux Network Administration | |||
| Protected: Introduction to networking | |||
| How does the internet work | |||
| What is a local area network | |||
| Protected: Practical networking commands | |||
| Practical networking commands continued | |||
| Protected: Using netstat to track detailed network statistics | |||
| An in-depth look at the Linux hosts file | |||
| Linux hosts file continued | |||
| Using traceroute to track the servers a request passes through | |||
| Using network mapper to track the activity on your network | |||
| Network mapper continued | |||
| Using SSH to access the command line of a remote host | |||
| Using SFTP to transfer files to and from machines | |||
| Setting up an SSH host on our local machine | |||
| Using the man command to learn about the programs on your machine | |||