The CompTIA Linux+ animated track.
Every domain on the XK0-006 V8 exam, mapped to our animated lessons and hands-on tools. Five domains, 32 sub-objectives β sourced directly from the official CompTIA objectives PDF. Vendor-neutral; works for RHEL, Ubuntu, Debian, openSUSE, Arch.
CompTIA Linux+ XK0-006 exam preparation. Vendor-neutral Linux certification track covering System Management, Security, Scripting with Containers and Automation, and Troubleshooting. Animated lessons and interactive tools mapped to each exam objective.CompTIA Linux+XK0-006V8
current exam β replaces XK0-005
Syllabus mirrors the official CompTIA Linux+ XK0-006 V8 Exam Objectives, Document Version 4.0 (Β© 2024 CompTIA). CompTIA publishes updates periodically β always cross-check the latest PDF on comptia.org before scheduling your exam.
System Management
Linux fundamentals, device management, storage, networking config, shell operations, backup and restore, and virtualization.
Boot process, Filesystem Hierarchy Standard (FHS), server architectures (x86_64, AArch64, RISC-V), package families (RPM vs dpkg), GUI components (Wayland, X), and open source / proprietary licensing.
Kernel modules (depmod, lsmod, modprobe), device discovery (dmesg, dmidecode, lspci, lsusb, lshw), and initrd tools (dracut, mkinitrd).
LVM (pv*/vg*/lv* commands), partitions (parted, fdisk, growpart), filesystems (xfs, ext4, btrfs, tmpfs), mounting (/etc/fstab, autofs), RAID with mdadm, and network mounts (NFS, SMB).
/etc/hosts, /etc/resolv.conf, NetworkManager (nmcli), Netplan, and the common network tools β ip, ss, dig, mtr, traceroute, tcpdump, nmap, curl.
Environment variables (PATH, HOME, SHELL), channel redirection (<, >, >>, |, here docs), shell utilities (awk, grep, sed, sort, uniq, xargs, tee), text editors (vi/vim, nano).
Archiving with tar and cpio, compression (gzip, bzip2, xz, 7-Zip), and full-file tools (dd, ddrescue, rsync, zcat/zgrep/zless).
KVM/QEMU hypervisors, VirtIO paravirtualized drivers, image operations (convert, resize, snapshots, clones), VM networking types (bridged, NAT, host-only, routed), and the libvirt toolchain (virsh, virt-manager).
Services and User Management
Files and directories, local accounts, processes and jobs, software management, systemd, and containers.
cd, cp, mv, rm, mkdir, find, locate, ln (symbolic vs hard links), stat, lsof, sdiff. Plus device types in /dev (block, character, special).
useradd/adduser/userdel, groupadd/groupmod, passwd, usermod, chage. Account files (/etc/passwd, /etc/shadow, /etc/group), UID/GID/EUID/EGID, user vs system vs service accounts.
ps, top, htop, atop, pstree, /proc/<PID>, kill/killall (signals: HUP, TERM, KILL), nice/renice, job control (bg/fg/jobs/nohup), scheduling (cron, at, anacron).
Package managers (dnf, apt, rpm, dpkg), language-specific (pip, cargo, npm), repository management, sandboxed apps, GPG signatures. Basic configs for DNS, DHCP, HTTP (httpd/Nginx), SMTP, IMAP4, NTP/PTP.
Unit types (services, timers, mounts, targets), systemctl + state management (start/stop/enable/disable/mask), and utilities (systemd-analyze, hostnamectl, timedatectl, resolvectl, sysctl).
Runtimes (Podman, Docker, containerd, runC), image operations (Dockerfile FROM/CMD/ENTRYPOINT/USER, layers, tags), container operations (run/exec/logs/inspect), volumes (incl. SELinux context, overlay), networks (bridge, host, macvlan, ipvlan, overlay), privileged vs unprivileged.
Security
Authentication and authorization, firewalls, OS hardening, account hardening, cryptography, and compliance.
PAM, Polkit, SSSD/Winbind realm, LDAP, Kerberos, Samba. Logging with journalctl, rsyslog, logrotate, /var/log. System audit with auditd and audit.rules.
firewalld (zones, services, rich rules, runtime vs permanent), ufw, nftables, iptables, ipset. Netfilter modules. Address translation (NAT, PAT, DNAT, SNAT), stateful vs stateless, IP forwarding.
Privilege escalation (sudo, /etc/sudoers, NOEXEC/NOPASSWD, visudo, wheel/sudo group, su -). File attributes (chattr/lsattr β immutable, append-only). Permissions (chmod octal/symbolic, chown, special bits, umask). ACLs (setfacl/getfacl). SELinux (restorecon, semanage, chcon, getsebool/setsebool, audit2allow, sealert, enforcing/permissive/disabled). Secure SSH (key vs password, PermitRootLogin, AllowUsers/Groups, SSH tunneling, SFTP). fail2ban, chroot, secure boot (UEFI). Avoid Telnet/FTP/TFTP.
Password complexity/length/expiration/reuse/history, MFA, breach-list checks, restricted shells (/sbin/nologin, /bin/rbash), pam_tally2, avoiding root for daily use.
Data at rest (GPG file encryption, LUKS2 filesystem encryption, Argon2). Data in transit (OpenSSL/LibreSSL, TLS versions, WireGuard). Hashing (SHA-256, HMAC), weak algorithm removal. Certificate management β trusted root certs, no-cost vs commercial CAs, avoiding self-signed.
Detection (anti-malware, IoCs), vulnerability scanning (CVE, CVSS, backporting patches, port scanners, protocol analyzers), standards (OpenSCAP, CIS Benchmarks), file integrity (AIDE, rkhunter, signed packages), secure data destruction (shred, badblocks, dd from /dev/urandom, cryptographic destruction), security banners (/etc/issue, /etc/issue.net, /etc/motd).
Automation, Orchestration, and Scripting
Infrastructure as Code, shell scripting, Python basics, Git, and (new in XK0-006) responsible use of AI for sysadmin work.
IaC (Ansible playbooks/inventory/modules/facts, Puppet classes/certificates, OpenTofu provider/resource/state/API), unattended deployment (Kickstart, cloud-init), CI/CD (version control, shift-left testing, GitOps, pipelines, DevSecOps), and deployment orchestration (Kubernetes Pods/Deployments/Services/Volumes/ConfigMaps/Secrets, Docker Swarm, Docker/Podman Compose).
Parameter expansion ${var}, command substitution $(cmd), subshells, functions, IFS/OFS, conditionals (if/case), loops (for/while/until), the #! interpreter directive, comparisons (numeric -eq/-gt/..., string =/==/=~, file -d/-f/-z), regex with =~, variables (env/args, export/local/set/unset), and return codes ($?).
Virtual environments, built-in modules, installing dependencies (pip), Python fundamentals (indentation, current versions, data types β bool/dict/float/int/list/string), extensibility via modules and packages, and PEP 8 best practices.
.gitignore, init/clone/config, add/commit/diff/log, branch/checkout, fetch/pull/push, merge/squash/rebase, reset/stash, and tagging.
NEW in XK0-006. Use cases (code/regex/IaC generation, documentation, compliance recommendations, security review, code optimization/linting). Best practices β avoid copy-paste without review, verify output. Data governance β LLM training risks, human review, local vs public models, corporate policy. Prompt engineering.
Troubleshooting
Monitoring concepts, then four common failure surfaces: hardware/storage/OS, networking, security, and performance.
Service-level concepts (SLA, SLI, SLO). Data acquisition (SNMP traps/MIBs, agent vs agentless, webhooks, health checks, log aggregation). Configurations β thresholds, alerts, events, notifications, logging.
Kernel panic, data/kernel corruption, package dependency issues, FS will-not-mount, server-not-turning-on, OS-filesystem-full, inode exhaustion, partition-not-writable, segfaults, GRUB misconfiguration, killed processes, PATH issues, systemd unit failures, missing drivers, quota issues, memory leaks.
Firewall misconfig, DHCP/DNS issues, interface misconfig (MTU mismatch, bonding, MAC spoofing, wrong subnet), routing/gateway, IP conflicts, dual-stack (IPv4/IPv6), link down, link negotiation.
SELinux issues (policy, context, booleans), file/directory permission issues (ACLs, attributes), account access, unpatched vulnerabilities, exposed/misconfigured services, remote access issues, certificate issues, misconfigured package repos, obsolete protocols/ciphers, cipher negotiation issues.
Swapping, OOM, slow app response, system unresponsiveness, high CPU/load average, high context switching, slow startup, high I/O wait, packet drops/jitter, random disconnects/timeouts, high latency, high disk latency, low throughput, blocked processes, hardware errors, CPU bottlenecks.
Red Hat-specific deep dive into the same skills. Strong complement to vendor-neutral Linux+.