diff --git a/docs/course/overview.md b/docs/course/overview.md index fddc1d5..820e94b 100644 --- a/docs/course/overview.md +++ b/docs/course/overview.md @@ -2,6 +2,14 @@ Learn Linux is structured as a full operator path, not a command glossary. The goal is to help you build judgment around real systems. +Use the course to practice the same loop you will use on production work: + +1. Inspect the current state before changing anything. +2. Make the smallest safe change in a lab. +3. Verify the result with command output, logs, or service behavior. +4. Write down what changed and what evidence supports it. +5. Repeat the work until the process is boring and reversible. + ## Audience This course is for: @@ -15,6 +23,8 @@ This course is for: You should be comfortable using a keyboard, browser, and terminal window. No prior Linux administration experience is assumed. +You will get more from the lessons if you keep a disposable lab nearby. See [Lab Setup](lab-setup.md) before running commands that install packages, edit service files, change accounts, touch storage, or alter networking. + ## Course tracks | Track | Chapters | Focus | @@ -24,6 +34,8 @@ You should be comfortable using a keyboard, browser, and terminal window. No pri | Operations depth | 20-29 | Storage, shared filesystems, configuration management, virtualization, containers, CI/CD, security, monitoring, performance | | Professional practice | 30-31 | Data center basics, policy, methodology, documentation, service management | +For the complete chapter sequence, use the [Syllabus](syllabus.md). For repeated terms, use the [Glossary](glossary.md) as a quick reference while you work through lessons. + ## Lesson pattern Each lesson should answer five questions: @@ -34,6 +46,40 @@ Each lesson should answer five questions: 4. What safe practice can you run in a lab? 5. How would you explain the result to a teammate? +When a lesson includes commands, prefer read-only inspection first. Commands such as `ip addr`, `ss -tulpen`, `systemctl status`, `journalctl -u`, `df -h`, `lsblk`, and `findmnt` are usually safer starting points than commands that restart services, rewrite files, or delete data. + +## How to Work Through a Chapter + +For each chapter: + +1. Read the chapter overview and list the operational risks it introduces. +2. Run one lesson's lab in a VM, container, cloud sandbox, or spare machine. +3. Save the commands you ran and the evidence they produced. +4. Answer the review questions without looking back at the lesson. +5. Write a short handoff note with the symptom, commands, result, and next step. + +That handoff habit matters. Linux work is rarely finished when a command succeeds; it is finished when another operator can understand what happened and safely continue. + +## Safety Boundaries + +Treat the following topics as lab-only until you understand the rollback path: + +- Disk partitioning, filesystems, RAID, LVM, ZFS, and Btrfs. +- Firewall, routing, DNS, DHCP, and identity configuration. +- User removal, password policy, sudo, PAM, and SSH hardening. +- Package upgrades, kernel changes, boot loaders, and service restarts. +- Backup, restore, incident response, and compliance evidence handling. + +If you are connected to a machine you care about, pause before running commands copied from a lesson or search result. Confirm the host, user, working directory, target file, and rollback plan first. + ## Assessment model This course does not require accounts, grading, or certificates. Use the capstone to validate readiness: build a small Linux service, secure it, monitor it, break it safely, recover it, and document the evidence. + +The [Capstone](capstone.md) is the final readiness check. A strong capstone submission includes: + +- A short design note explaining the service and risk model. +- Baseline evidence from the host before changes. +- Build, security, monitoring, failure, recovery, and cleanup notes. +- Commands and outputs that prove the final state. +- A handoff document that another operator could follow.