Linux IT Associate (LF-ASC)

Linux IT Associate prepares beginners for careers in Linux, cloud, and modern IT systems

Description

This training provides pre-professional learning for individuals starting a career in IT as administrators or engineers. It covers core concepts of Linux systems, networking, cloud computing, and scripting for automation.

Participants will develop skills in managing, configuring, and maintaining Linux environments while understanding modern IT infrastructure. The course also prepares participants for the LFCA certification. Designed for system, cloud, and storage administrators, it combines theory, case studies, quizzes, and hands-on labs.

Why Take This Course?

  • Master Scalable Cloud Storage

    Gain the skills to design, manage, and optimize modern storage solutions that power mission-critical cloud environments.

  • Understand Cloud Concepts & System Automation

    Gain skills in scripting, system management, and Cloud Computing fundamentals used in modern IT environments.

  • Prepare for Professional IT Certification LFCA

    Get ready for the Linux Foundation Certified IT Associate (LFCA) to validate your Linux and cloud expertise

Facilities

  • Hands-on Lab Environment – Train using dedicated virtual machines with full access to lab resources via Jumpserver (RDP & SSH), enabling real-world practice throughout the training.
  • Downloadable Lab Environment – Continue practicing after the training with our VM Lab Downloader (.qcow2), allowing you to run the lab environment on your own machine.
  • Complete Learning Materials – Get comprehensive digital training materials and a handbook with up to 1 year access, plus a certificate of course completion.
  • Post-Training Support – Continue learning after the class with access to training records (for online sessions) and community discussion groups to help reinforce your skills.

Syllabus

Linux Fundamentals
  • Linux Operating System
  • Command Line Essentials
  • Disaster Recovery
  • lab 1.0: Setup NUSACTL
  • Lab 1.1: System Management and Software Administration
  • Lab 1.2: Command Line Proficiency and Automation
Linux Operating System
  • Linux History​
  • The Boot Process
  • What is Kernel?​
  • Runlevel​
  • Systemd​
  • Linux Distributions
  • Summary
File & User Management
  • Filesystem & File Permission
  • User & Group Management
  • Shell Scripting & Process Management
  • Lab 2.1: File System Security and User Administration
  • Lab 2.2: Shell Scripting for System Monitoring
Networking Essentials
  • Network Configurations
  • Protocols & Services
  • Network Troubleshooting on Linux
  • Lab 3.1: Networking in Linux
File Management Commands​
  • Home Directories​
  • /bin and /sbin directories​
  • /dev Directory​
  • /etc directory​
  • /boot​ directories
  • Additional directory under :/​
  • /usr directory tree​
  • Basic Operations​
  • File Permission​
  • Managing User​
  • Summary
System Commands​
  • Shell Scripting​
  • Absolute and Relative Path​
  • Exploring Filesystem​
  • Manage Processes​
  • Managing Jobs​
  • Summary
Cloud Computing
  • Cloud Models & Providers
  • Serverless & Availability
  • Cloud Budgeting
  • Lab 4.1: Exploring Cloud Services
  • Lab 4.2: Cloud Cost Estimation & Capacity Planning
General Networking Commands​
  • Network Configuration Files​
  • Network Interfaces​
  • Networking Tools
  • Summary
Security & Cryptography
  • Security Fundamentals
  • Cryptography
  • Sensitive Data & Compliance
  • Lab 5.1: SSH Key Generation & Integrity Verification
  • Lab 5.2: Sensitive Data Identification & Strategy
System Security
  • Security Principles & Firewall
  • Linux Security
  • System Hardening
  • Lab 6.1: Firewall Configuration & System Security States
  • Lab 6.2: System Hardening
System Administration Tasks​
  • Linux Filesystem Hierarchy
  • Software Packaging Concepts​
  • DPKG Essentials​
  • RPM Essentials​
  • Advanced Packaging Tool (APT)
  • Files Ownership & Permission
  • systemctl
  • System Monitoring​
  • cgroups​
  • Summary
Networking​
  • IP Addresses​
  • Name Resolution​
  • Networking Protocols & Utilities
  • VPN​
  • Summary
DevOps & Project Management
  • DevOps & Containers
  • IT Project Management
  • Software Architecture & Open Source
  • Lab 7.1: Git Fundamentals & Branch Management
  • Lab 7.2: Docker Container Operations & LFCA Assessment
Troubleshoot​
  • Troubleshooting Levels​
  • Basic Troubleshooting Techniques​
  • Things to Check
  • Boot Process Failures​
  • Diagnosing problem with a service​
  • Summary
Cloud Computing Fundamentals ​
  • What is Cloud Computing​
  • Types of Cloud Computing Services
  • 3 Options Cloud Computing​
  • Cloud Deployment Models
  • Cloud Init​
  • Infrastructure as a Service (IaaS)​
  • Platform as a Service (PaaS)​
  • Software as a Service (SaaS)​
  • Summary
Performance and Availability​
  • Performance / Availability​
  • High Availability​
  • Disaster Recovery​
  • HA vs Disaster Recovery (DR)​
  • Quiz
  • Summary
Serverless​
  • Serverless Computing​
  • Differences of IaaS, CaaS, PaaS, SaaS, FaaS​
  • Features and Benefits of Serverless Computing​
  • Drawbacks of Serverless Computing​
  • Introduction to AWS Lambda​
  • Introduction to Google Cloud Functions​
  • Example of Serverless Architecture​
  • OpenFaaS​
  • Serverless Computing and Containers​
  • Knative​
  • Summary
Cloud Costs and Budgeting​
  • Average Cost of Cloud Computing​
  • Budgetting​
  • Cost Reducing Tips
  • Summary
  • Quiz
Security Basics​
  • Basic Security Concepts
  • GDPR​
  • 7 Primary Principles for Processing Personal Data​
  • Summary
Data Security​
  • What Does "Data Security" Mean?​
  • Data Security​ Types​
  • Access Control​
  • Summary
Network Security​
  • Security Concepts, Principles, and Awareness
  • Security Principles​
  • Security Awareness ​
  • Service Practices​
  • Network Security Components
  • Firewall ​
  • DMZ​
  • Intrusion Prevention System (IPS)​
  • Network Inspection​
  • Chroot​
  • VPN Connection Types​
  • Application Security​
  • Linux Security Modul​
  • Selinux Overview​
  • Denial-of-Service (DoS) attack​
  • Summary
System Security​
  • Local System Security Overview​
  • Creating a Security Policy​
  • What to Include in the Policy​
  • What Risks to Assess​
  • Hardware Accessibility Vulnerability​
  • Hardware Access Guidelines​
  • BIOS​
  • Symmetric Cryptography​
  • Asymmetric Cryptography​
  • Advanced Intrusion Detection Environment (AIDE)​
  • APT (Advanced Persistent Threat)​
  • Session Hijacking​
  • Summary
DevOps Basics​
  • What is DevOps ?​
  • DevOps Principles​
  • Benefits of Devops​
  • Agile​
  • Agile & DevOps​
  • Summary
Containers​
  • Containers​ Overview
  • VM and Containers​
  • Container and Microservices​
  • Microservices vs Monolithic​
  • Microservices​
  • Container Tools​
  • Docker​
  • Container Orchestration​
  • Summary
Deployment Environments​
  • Deployment in Software Development​
  • The Development Environment​
  • Staging Environment​
  • Production Environment​
  • Benefits of Using Multiple Deployment Environments​
  • Summary
Git Concepts​
  • What is Git​
  • VCS (Version Control System)​
  • Git Repo​sitory
  • Git Conflicts​ ​
  • Basic Git Commands​
  • Advantages of using Git ​
  • Summary
Software Project Management
Software Application Architecture​
  • 10 Common Architectural Pattern​
  • Layered Pattern ​
  • Client-server pattern​
  • Master-slave pattern​
  • Peer-to-peer pattern​
  • Model-view-controller pattern​
  • Choosing an Application Architecture ​
  • Summary
Functional Analysis
MySQL​
  • MySQL Overview​
  • DBMS vs RDBMS​
  • Table​, Field, Record / Row​, and Null value
  • Field​
  • Record / Row​
  • NULL Value​
  • SQL​, Constraints, and Data Integrity
  • SQL Constraints​
  • Data Integrity​
  • Database Normalization​
  • Reason to use MySQL​
  • Summary
  • Lab : MySQL Practice​
Open-source Software and Licensing​
  • What is Open Source Software?​
  • The Difference with Other Software​
  • Open Source License​
  • Why Prefer Open Source Software​
  • Open Source is More Than Free Charge​
  • Summary
Cronjob​
  • Cronjob​
  • Cron Schedule Syntax​
  • Quiz
  • Summary
Overview Linux Foundation IT Associate (LFCA)​
  • Linux Foundation IT Associate (LFCA)
  • Bootcamp IT Engineer Associate Exam Grading Information
  • Quiz
Changelog

Common Questions

Is there a minimum number of participants required for the training to run?

Yes, the training can be conducted with a minimum of 4 participants. If the number of participants does not meet the minimum requirement, you may contact us for further information on the available options.

Is it possible to customize the training materials?

Yes, the training materials can be customized based on your needs. The topics are not limited to Cloud, CloudSecOps, and DevSecOps.

Available Training

Accelerate Your Professional Growth

Category SysAdm
Duration None
Level Beginner
Method Offline / Online / In-house

Need help?

Contact our team for corporate training inquiries.

Phone Icon Chat on WhatsApp

Related Courses

Course Image
Pro Training

Linux System Administration (LF-ADM)

Linux admin training on systems, networking, storage, containers, and LFCS preparation

Intermediate

modules

6 Modules

duration

None