From the course: CompTIA Linux+ (XK0-005) Cert Prep
Unlock the full course today
Join today to access over 24,200 courses taught by industry experts.
Copy files between systems - Linux Tutorial
From the course: CompTIA Linux+ (XK0-005) Cert Prep
Copy files between systems
- [Instructor] The easiest way to copy a file from a local Linux host to a remote Linux host is using the SCP command. SCP uses the authentication and tunnel link functionality of SSH, so if you can SSH to a remote host, chances are you can secure a copy to it. The syntax for SCP is fairly simple. SCP followed by command options, then the local file or file pattern followed by the destination. Because the destination is a remote host, you'll need to include the username at the host name colon, and the remote path. Options that may be useful are -capital C to specify the remote SSH port if it's not the default. - P preserves permissions and ownership. - R copies files recursively. - capital C to compress the files if the network connection is slow. - lowercase C to specify the cipher used. Some ciphers require fewer CPU cycles and can speed up a copy. - I for the ID file for passwordless authentication. If these options…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
About Linux Shells6m 21s
-
(Locked)
About Linux Terminals1m 50s
-
(Locked)
Get help on the command line5m 8s
-
(Locked)
Understand the Linux Filesystem Hierarchy8m 22s
-
(Locked)
Understand filesystem paths6m 2s
-
(Locked)
Create files and dirs4m 11s
-
(Locked)
Get information about files5m 29s
-
(Locked)
Copy files and dirs4m 39s
-
(Locked)
Move and rename files and dirs4m 11s
-
(Locked)
Remove files and dirs3m 44s
-
(Locked)
Create links to files and dirs6m 24s
-
(Locked)
Use input-output redirection (>, >>, |, 2>)1m 55s
-
(Locked)
Connect programs with named and unnamed pipes4m 19s
-
(Locked)
File redirects and tees6m 7s
-
(Locked)
Find files using Locate4m 11s
-
(Locked)
Find files with Find7m 28s
-
-
-
About Linux processes1m 32s
-
(Locked)
Monitor processes using ps5m 40s
-
(Locked)
Monitor processes in real time5m 3s
-
(Locked)
Manage processes8m 25s
-
(Locked)
Manage process jobs4m
-
(Locked)
Introduction to systemd services4m 13s
-
(Locked)
Get systemd service status5m 37s
-
(Locked)
Manage systemd services4m 45s
-
(Locked)
Make systemd services persistent1m 40s
-
(Locked)
Introduction to job scheduling2m 1s
-
(Locked)
One-time jobs using at and batch3m 55s
-
(Locked)
About cronjobs3m 5s
-
(Locked)
Systemd timers3m 44s
-
(Locked)
Analyze system processes and optimize3m 10s
-
(Locked)
Troubleshoot applications and hardware2m 35s
-
-
-
Linux networking overview2m 54s
-
(Locked)
Prepare for Linux networking1m 10s
-
(Locked)
Configure live network connections6m 37s
-
(Locked)
Configure saved network connections6m 48s
-
(Locked)
Configure networking with NetworkManager8m 59s
-
(Locked)
Troubleshoot DNS client issues2m 42s
-
(Locked)
Monitor the network and remediate2m 24s
-
-
-
User and group overview3m 47s
-
(Locked)
User account file5m 39s
-
(Locked)
User password file4m 49s
-
(Locked)
Group accounts and passwords3m 31s
-
(Locked)
Create and delete users5m 26s
-
(Locked)
Modify user accounts4m 4s
-
(Locked)
Create and delete groups4m 7s
-
(Locked)
Assign users to groups2m 33s
-
(Locked)
Become a super user5m 49s
-
(Locked)
Elevate group privileges4m
-
(Locked)
Elevate privileges using sudo3m 21s
-
(Locked)
Manage sudo users5m
-
-
-
Linux storage system overview9m 13s
-
(Locked)
Prepare for handling storage1m 36s
-
(Locked)
Create partitions using fdisk5m 4s
-
(Locked)
Create partitions using parted3m 59s
-
(Locked)
Manage LVM volumes and volume groups7m 25s
-
(Locked)
Expand existing logical volumes2m 47s
-
(Locked)
Reduce existing logical volumes3m 37s
-
(Locked)
Create EXT filesystems4m 20s
-
(Locked)
Repair EXT filesystems5m 15s
-
(Locked)
Create and repair XFS filesystems1m 52s
-
(Locked)
MDRAID or DMRAID?1m 43s
-
(Locked)
Create a RAID 5 using LVM7m 1s
-
(Locked)
Create RAIDs using mdadm9m 31s
-
(Locked)
Mount filesystems on boot5m 54s
-
(Locked)
Encrypt drives with LUKS2m 42s
-
(Locked)
Troubleshoot storage systems4m 18s
-
-
-
Software management systems overview5m 52s
-
(Locked)
DNF overview3m 2s
-
(Locked)
Get DNF packages by name4m 9s
-
(Locked)
Get info on packages with DNF4m 9s
-
(Locked)
Get info on package groups with DNF3m 13s
-
(Locked)
Search for packages with DNF1m 34s
-
(Locked)
Install and remove packages with DNF4m 7s
-
(Locked)
Install and remove package groups with DNF2m 32s
-
(Locked)
Get package information with RPM8m 15s
-
(Locked)
Manage DNF repositories5m 32s
-
(Locked)
Manage OS updates5m 50s
-
(Locked)
Update the kernel5m 30s
-
(Locked)
Manage kernel modules4m 50s
-
(Locked)
Get package information with dpkg and APT5m 40s
-
(Locked)
Manage software with dpkg and APT3m 55s
-
(Locked)
Work with APT repositories8m 2s
-
(Locked)
Install software from source4m 58s
-
(Locked)
About sandboxed applications8m 44s
-
-
-
What is a file?4m 59s
-
(Locked)
Get information about files5m 28s
-
(Locked)
About extended attributes3m 54s
-
(Locked)
Get extended attributes4m 14s
-
(Locked)
Linux permissions overview1m 52s
-
(Locked)
File and directory modes1m 16s
-
(Locked)
File ownership3m 14s
-
(Locked)
Permissions using numeric method3m 2s
-
(Locked)
Permissions using symbolic method4m 44s
-
(Locked)
Initial permissions using umask4m 30s
-
(Locked)
Special file bits: SUID and SGID4m 59s
-
(Locked)
Special directory bits: SGID and Sticky5m 53s
-
(Locked)
Access control lists overview3m 32s
-
(Locked)
Read access control lists3m 33s
-
(Locked)
Set access control lists5m 40s
-
(Locked)
Configure inheritance with default access control lists4m 1s
-
(Locked)
Delete access control lists4m 13s
-
(Locked)
Troubleshoot access control3m 18s
-
-
-
Set enforcing and permissive modes for SELinux5m 13s
-
(Locked)
List and identify SELinux file and process context3m 28s
-
(Locked)
Restore SELinux default file contexts4m 11s
-
(Locked)
Use booleans to modify SELinux behavior2m 33s
-
(Locked)
Diagnose routine SELinux policy violations6m 57s
-
(Locked)
Maintain security context when managing files1m 6s
-
(Locked)
Use AppArmor4m 22s
-
-
-
About pluggable authentication modules5m 12s
-
(Locked)
Use login counters5m 57s
-
(Locked)
Change default password policies3m 39s
-
(Locked)
Edit global user account defaults1m 46s
-
(Locked)
Lock user accounts and change password aging3m 41s
-
(Locked)
Force password resets1m 34s
-
(Locked)
Configure Secure Shell2m 35s
-
(Locked)
Explore PKI concepts4m 38s
-
(Locked)
Configure key-based authentication for SSH2m 46s
-
(Locked)
Tunnel data with SSH4m 8s
-
(Locked)
Summarize security best practices4m 16s
-
-
-
What makes a shell script a shell script?3m 18s
-
(Locked)
Positional arguments4m 4s
-
(Locked)
File globbing2m 3s
-
(Locked)
Wildcards4m 42s
-
(Locked)
Bash variable scope1m 17s
-
(Locked)
Output to STDOUT and STDERR1m 55s
-
(Locked)
Pipe data into a script3m 2s
-
(Locked)
Conditional flow with if, then if3m 12s
-
(Locked)
Conditional flow with case2m 21s
-
(Locked)
Numeric conditions3m 45s
-
(Locked)
String conditions57s
-
(Locked)
File conditions1m 33s
-
(Locked)
For loop2m 42s
-
(Locked)
While loop1m 30s
-