Linux Foundation Training Courses

The Linux Foundation was founded to build a sustainable eco-system around Linux and open source projects and to accelerate and co-ordinate open source adoption and development.

As part of this mission the Linux Foundation offers a range of training courses and certification's related to the key open source projects driving technological innovation today.

Only Official Linux Foundation Training Partner in Africa

Jumping Bean is proud to be the only official Linux Foundation training partner in Africa offering a wide range of Linux Foundation training courses and related certification.

Linux Foundation Certifications

We offer training in the following Linux Foundation certifications:

Linux Foundation Courses

We also provide the following Linux Foundation courses:

Linux Foundation Certified System Administrator

The LFCS certification is for those looking to enter the lucrative field of Linux system administration. The course cover the installation, management and monitoring of a Linux system. Students will be taught the key concepts of the Linux system design philosophy and how to configure the various sub-systems such as networking, storage, security, monitoring and logging.

Demand for Linux System Admins at all time high

With the growth in cloud usage the demand for Linux system administrators has never been higher. Get certified and super charge your career.  The exam is a practical and students are given the option to of Ubuntu or CentOS for their exam.

Linux System Administrator Course Outline

  • Essential Commands
    • Log into local & remote graphical and text mode consoles
    • Search for files
    • Evaluate and compare the basic file system features and options
    • Compare and manipulate file content
    • Use input-output redirection (e.g. >, >>, |, 2>)
    • Analyze text using basic regular expressions
    • Archive, backup, compress, unpack, and uncompress files
    • Create, delete, copy, and move files and directories
    • Create and manage hard and soft links
    • List, set, and change standard file permissions
    • Read, and use system documentation
    • Manage access to the root account
  • Operation of Running Systems
    • Boot, reboot, and shut down a system safely
    • Boot or change system into different operating modes
    • Install, configure and troubleshoot bootloaders
    • Diagnose and manage processes
    • Locate and analyze system log files
    • Schedule tasks to run at a set date and time
    • Verify completion of scheduled jobs
    • Update software to provide required functionality and security
    • Verify the integrity and availability of resources
    • Verify the integrity and availability of key processes
    • Change kernel runtime parameters, persistent and non-persistent
    • Use scripting to automate system maintenance tasks
    • Manage the startup process and services (In Services Configuration)
    • List and identify SELinux/AppArmor file and process contexts
    • Manage Software
    • Identify the component of a Linux distribution that a file belongs to
  • User and Group Management
    • Create, delete, and modify local user accounts
    • Create, delete, and modify local groups and group memberships
    • Manage system-wide environment profiles
    • Manage template user environment
    • Configure user resource limits
    • Manage user privileges
    • Configure PAM
  • Networking
    • Configure networking and hostname resolution statically or dynamically
    • Configure network services to start automatically at boot
    • Implement packet filtering
    • Start, stop, and check the status of network services
    • Statically route IP traffic
    • Synchronize time using other network peers
  • Service Configuration
    • Configure a caching DNS server
    • Maintain a DNS zone
    • Configure email aliases
    • Configure SSH servers and clients
    • Restrict access to the HTTP proxy server
    • Configure an IMAP and IMAPS service
    • Query and modify the behavior of system services at various operating modes
    • Configure an HTTP server
    • Configure HTTP server log files
    • Configure a database server
    • Restrict access to a web page
    • Manage and configure containers
    • Manage and configure Virtual Machines
  • Storage Management
    • List, create, delete, and modify physical storage partitions
    • Manage and configure LVM storage
    • Create and configure encrypted storage
    • Configure systems to mount file systems at or during boot
    • Configure and manage swap space
    • Create and manage RAID devices
    • Configure systems to mount file systems on demand
    • Create, manage and diagnose advanced file system permissions
    • Setup user and group disk quotas for filesystems
    • Create and configure file systems


Linux Foundation Certified Engineer

The LFCE certification builds on the LFSA certification and is aimed at Linux administrators with 3-5 years experience installing, configuring and maintaining Linux systems.

It demonstrates a higher level of skill than an entry level system administrator and is suitable for team leads or senior system administrators.

Administer Linux at Scale

As the size of system grow, along with their need for reliability and availability so the need for highly skilled Linux administrators has grown.

The need has become so great that the role Site Reliability Engineer has been created to describe the skills required to maintain Internet scale systems.

This certification provides you with skills required to fulfill this role.

Linux System Engineer Course Outline

  • Essential Commands
    • Use version control tools
    • Manipulate file content programmatically
    • Run commands on many systems simultaneously
    • Install Linux Distribution Essential Commands
  • Operation of Running Systems
    • Monitor, tune and troubleshoot system performance
    • Update operating systems to provide required functionality and security
    • Update the kernel and ensure the system is bootable
    • Script automation tools to make work faster and more accurate
    • Train team members on new technology or changes to existing systems
    • Maintain systems via configuration management tools
    • Maintain the integrity and availability of hardware
    • Develop and test disaster recovery plans
    • Support incident management for outages/trouble
    • Produce and deliver reports on system use (processor, memory, disk, and network), outages, and user requests
    • Monitor security and conduct audits
    • Manipulate Linux system during the recovery process
    • Use udev for device detection and management
    • Configure and modify SELinux/AppArmor policies
  • User and Group Management
    • Connect to an external authentication source
    • Configure advanced PAM
  • Networking
    • Monitor, tune and troubleshoot network performance
    • Configure network traffic tunneling
    • Configure a system to perform Network Address Translation
    • Dynamically route IP traffic
    • Implement advanced packet filtering
  • Service Configuration
    • Implement and configure an HTTP server
    • Implement and configure time synchronization server
    • Implement and configure network logging server
    • Configure a DHCP server
    • Implement and configure an SMTP service
    • Implement and configure the HTTP proxy server
    • Configure host-based and user-based security for a service
    • Implement and configure a centralized authentication server
    • Implement and configure a PXE Boot server
    • Implement and configure an authoritative DNS server
  • Storage Management
    • Manage advanced LVM configuration
    • Identify storage devices using block device attributes
    • Manage Linux file system features and flags
    • Implement and configure remote block storage devices
    • Implement and configure network shares
  • System Design and Deployment
    • Define a capacity planning strategy
    • Conduct post deployment verifications
    • Create and maintain software packages
    • Create, configure and maintain containers
    • Deploy, configure, and maintain high availability/clustering/replication

Embedded  Linux Development (LFD450)

This course is for experienced developers looking to develop an embedded Linux system. Attendees will learn about the Linux kernel architecture and how to customise it for embedded platforms. This includes techniques for right sizing, cross development environments, boot loaders and device trees.

Embedded Linux Development Course Outline
  • Embedded and Real-Time Systems Concepts
  • Cross-Development Environments: Goals and Needs
  • Kbuild System
  • Cross-Development Toolchain
  • Basic Target Development Board Setup
  • Booting the Target Development Board from uSD
  • Booting a Target Development Board over Ethernet
  • Boot loaders and U-Boot
  • Kernel Configuration, Compilation, Booting
  • Device Drivers
  • Device Trees
  • Target Filesystem Packaging
  • Build Target Root Filesystem
  • Root Filesystem Choices
  • Configuring uClibc
  • Another Alternate C-library: musl **
  • Build BusyBox Utility Suite
  • Kernel Monitoring and Debugging
  • Right-Sizing
  • Memory Technology Devices (Flash Memory Filesystems)
  • Compressed Filesystems
  • System Upgrades
  • Real-Time Extensions

Developing Embedded Linux Device Drivers (LFD435)

If you need to develop drivers for an embedded Linux system this course is for you. This course will enable you to choose the appropriate API to use when writing your device driver; the different kind of devices drivers in Linux and the various Linux sub systems.  It will also familiarise developers with cross platform tool chains targeting embedded systems.

Developing Embedded Linux Device Drivers Course Outline

  • Cross-Development Toolchain
  • QEMU
  • Booting a Target Development Board from uSD
  • Booting a Target Development Board over Ethernet
  • Kernel Configuration, Compilation, Booting
  • Device Drivers
  • Modules and Device Drivers
  • Memory Management and Allocation
  • Character Devices
  • Kernel Features
  • Transferring Between User and Kernel Space
  • Platform Drivers
  • Device Trees
  • Interrupts and Exceptions
  • Timing Measurements
  • Kernel Timers    
  • ioctls
  • Unified Device Model and sysfs
  • Firmware
  • Sleeping and Wait Queues
  • Interrupt Handling: Deferrable Functions and User Drivers
  • Hardware I/O
  • Direct Memory Access (DMA)
  • Memory Technology Devices (Flash Memory Filesystems)
  • USB Drivers

Certified Kubernetes Administrator (CKA)

Containers are the new paradigm for shipping software and configuring infrastructure; and in the container world Kubernetes is the domain container orchestration and management system.

This certification provides one with the knowledge to harness the power of Kubernetes to deploy application, manage clusters, configure storage, networks and logging and maintain scalable robust infrastructure.

Kubernetes powers the cloud


Kubernetes is all the rage for those organisation who need to deploy at Internet scale or who wish to leverage the ease and flexibility of deployment Kubernetes brings to software infrastructure. Get certified and pick your preferred employer.

Kubernetes Administrator Course Outline

  • Storage
    • Understand storage classes, persistent volumes
    • Understand volume mode, access modes and reclaim policies for volumes
    • Understand persistent volume claims primitive
    • Know how to configure applications with persistent storage
  • Troubleshooting
    • Evaluate cluster and node logging
    • Understand how to monitor applications
    • Manage container stdout & stderr logs
    • Troubleshoot application failure
    • Troubleshoot cluster component failure
    • Troubleshoot networking
  • Workloads & Scheduling
    • Understand deployments and how to perform rolling update and rollbacks
    • Use ConfigMaps and Secrets to configure applications
    • Know how to scale applications
    • Understand the primitives used to create robust, self-healing, application deployments
    • Understand how resource limits can affect Pod scheduling
    • Awareness of manifest management and common templating tools
  • Cluster Architecture, Installation & Configuration
    • Manage role based access control (RBAC)
    • Use Kubeadm to install a basic cluster
    • Manage a highly-available Kubernetes cluster
    • Provision underlying infrastructure to deploy a Kubernetes cluster
    • Perform a version upgrade on a Kubernetes cluster using Kubeadm
    • Implement etcd backup and restore
  • Services & Networking
    • Understand host networking configuration on the cluster nodes
    • Understand connectivity between Pods
    • Understand ClusterIP, NodePort, LoadBalancer service types and endpoints
    • Know how to use Ingress controllers and Ingress resources
    • Know how to configure and use CoreDNS
    • Choose an appropriate container network interface plugin

Certified Kubernetes Application Developer (CKAD)

Do you build, deploy and configure cloud native applications? If so this certification is for you. A certified Kubernetes App Developer candidate knows how to build micro-service applications in Java, Go, Python, Node.js or Java and requires the skills to define application resources and leverage core Kubernetes primitives to build scalable applications ready for deployment to a Kubernetes cluster.

performance based exam

As with all Linux Foundations certifications the exam is performance based. The exam assumes familiarity with container run-times and micro-service architecture but does not test for these directly.

Kubernetes App Developer Course Outline

  • Core Concepts
    • Understand Kubernetes API primitives
    • Create and Configure Basic Pods
  • Configuration
    • Understand ConfigMaps
    • Understand SecurityContexts
    • Define an application’s resource requirements
    • Create & consume Secrets
    • Understand ServiceAccounts
  • Multi-Container Pods
    • Understand Multi-Container Pod design patterns (e .g. ambassador, adapter, sidecar)
  • Observability
    • Understand LivenessProbes and ReadinessProbes
    • Understand container logging
    • Understand how to monitor applications in Kubernetes
    • Understand debugging in Kubernetes
  • Pod Design
    • Understand how to use Labels, Selectors, and Annotations
    • Understand Deployments and how to perform rolling updates
    • Understand Deployments and how to perform rollbacks
    • Understand Jobs and CronJobs
  • Services & Networking
    • Understand Services
    • Demonstrate basic understanding of Network Policies
  • State Persistence
    • Understand Persistent Volume Claims for storage

Linux Device Driver Development

Do you need to write your own Linux device driver? This course will teach you how.  You will learn which APIs to call, which sub-systems to use, how to debug your driver and interface with the kernel and which modules to leverage.

Linux Device Driver Development Course Outline
  • Device Drivers
  • Modules and Device Drivers
  • Memory Management and Allocation
  • Character Devices
  • Kernel Features
  • Transferring Between User and Kernel Space
  • Interrupts and Exceptions
  • Timing Measurements
  • Kernel Timers
  • ioctls
  • Unified Device Model and sysfs
  • Firmware
  • Sleeping and Wait Queues
  • Interrupt Handling: Deferrable Functions and User Drivers
  • Hardware I/O
  • PCI
  • Platform Drivers
  • Direct Memory Access (DMA)
  • Network Drivers I: Basics
  • Network Drivers II: Data Structures
  • Network Drivers III: Transmission and Reception
  • Network Drivers IV: Selected Topics
  • USB Drivers
  • Power Management
  • Block Drivers

Linux Security Fundamentals (LFS216)

As cyber security threats continue to grow the demand for system administrators skilled in hardening Linux systems, analyzing and monitoring for attacks grows in tandem.

Beside practical techniques, tools and services to secure you systems, this course will teach you how to develop your security policy and response strategy. It will assist you in ensuring your compliance with data security regulations.

Linux Security Course Outline

  • What is Security?
  • Classes of Attackers
  • Physical Security
  • Logging Overview
  • Auditing Basics
  • Bugs and Tools
  • Kernel and User Spaces
  • Encryption and Authentication
  • Standard UNIX Permissions
  • TCP/IP Protocols Review
  • Network Tools
  • Network Basics
  • Unencrypted Protocols
  • Firewalling Basics
  • Preparation
  • Compliance Testing

Contact Us

Please contact us for any queries via phone or our contact us form. We will be happy to answer your questions!

3 Appian Place,373 Kent Ave

2194 South Africa
Tel: +2711-781 8014

Contact Form

Jumping Bean Contact Form!

Contact Form