SBN

Linux+ Certification and InfoSec Institute’s Linux-related Training and Courses

Linux operating system (OS) is used by many users both at home and at the office: it is running on personal computers, mobile devices, and web server systems on-premise, hosted or in the cloud. So, why so many Linux addicts? Free, open-source and with a community of enthusiastic supporters and experts, Linux is the choice of many for private and commercial purposes, as it allows total control and customization capabilities.

It is important for IT professionals, then, to acquire competency and expertise in handling this popular OS as they might be asked to assume responsibilities that include installing, configuring, and maintaining the Linux servers and workstations in roles like Administrator, Security Researcher or Ethical Hacker, just to name a few. It is a good idea to consider an infrastructure-specific certification, like the CompTIA Linux+ certification, a vendor-neutral credential that “covers everything from how to configure systems and navigate command lines to how to customize the environment and create simple scripts,” as mentioned by Teresa Sears who guides the development of CompTIA’s portfolio of IT skills certifications.

On April 2010, CompTIA and the Linux Professional Institute (LPI) created a standardized Linux certification program. “Under the terms of the agreement CompTIA [adopted] LPIC-1 exams (LPI-101 and LPI-102) for the new CompTIA Linux + Powered by LPI certification.” At that time, the CompTIA LX0-101 and LX0-102 exams were launched, and those passing the CompTIA Linux+ powered by LPI tests qualified for both the CompTIA certification and the LPIC-1 certification.

Linux+ offers a comprehensive approach to designing, deploying, and managing Linux systems and provides the basic steps for a career as systems administrator tasked with the management of a Linux environment. The skills covered by the test range from installation, GNU and Unix commands, file systems, scripts, shells, and data management, to user (Read more...)

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Daniel Brecht. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/4WeHGhSbmFo/