Linux Unix Training Classes in Bowie, Maryland

Learn Linux Unix in Bowie, Maryland and surrounding areas via our hands-on, expert led courses. All of our classes either are offered on an onsite, online or public instructor led basis. Here is a list of our current Linux Unix related training offerings in Bowie, Maryland: Linux Unix Training

We offer private customized training for groups of 3 or more attendees.
Bowie  Upcoming Instructor Led Online and Public Linux Unix Training Classes
Linux Fundamentals Training/Class 23 March, 2026 - 27 March, 2026 $2200
HSG Training Center instructor led online
Bowie, Maryland 20715
Hartmann Software Group Training Registration
Linux Troubleshooting Training/Class 2 March, 2026 - 6 March, 2026 $2290
HSG Training Center instructor led online
Bowie, Maryland 20715
Hartmann Software Group Training Registration
RED HAT ENTERPRISE LINUX SYSTEMS ADMIN I Training/Class 18 May, 2026 - 22 May, 2026 $2250
HSG Training Center instructor led online
Bowie, Maryland 20715
Hartmann Software Group Training Registration
RED HAT ENTERPRISE LINUX SYSTEMS ADMIN II Training/Class 29 June, 2026 - 2 July, 2026 $1890
HSG Training Center instructor led online
Bowie, Maryland 20715
Hartmann Software Group Training Registration
Docker Training/Class 27 May, 2026 - 29 May, 2026 $1690
HSG Training Center instructor led online
Bowie, Maryland 20715
Hartmann Software Group Training Registration
ANSIBLE Training/Class 27 April, 2026 - 29 April, 2026 $1990
HSG Training Center instructor led online
Bowie, Maryland 20715
Hartmann Software Group Training Registration

View all Scheduled Linux Unix Training Classes

Linux Unix Training Catalog

cost: $ 1390length: 4 day(s)
cost: $ 1390length: 4 day(s)
cost: $ 1990length: 3 day(s)
cost: $ 2250length: 5 day(s)
cost: $ 2800length: 4 day(s)
cost: $ 2490length: 5 day(s)
cost: $ 2250length: 5 day(s)
cost: $ 2250length: 5 day(s)
cost: $ 2290length: 4 day(s)
cost: $ 2190length: 5 day(s)
cost: $ 1690length: 4 day(s)
cost: $ 1890length: 3 day(s)
cost: $ 1890length: 4 day(s)
cost: $ 2490length: 3 day(s)
cost: $ 2680length: 4 day(s)
cost: $ 2490length: 4 day(s)
cost: $ 1290length: 3 day(s)
cost: $ 2250length: 5 day(s)
cost: $ 1090length: 3 day(s)
cost: $ 2200length: 5 day(s)
cost: $ 2250length: 5 day(s)
cost: $ 2400length: 5 day(s)
cost: $ 2250length: 5 day(s)
cost: $ 2490length: 4 day(s)
cost: $ 990length: 2 day(s)
cost: $ 2290length: 5 day(s)
cost: $ 2250length: 5 day(s)
cost: $ 1890length: 4 day(s)
cost: $ 1890length: 4 day(s)
cost: $ 1890length: 4 day(s)
cost: $ 2400length: 4 day(s)
cost: $ 2090length: 3 day(s)
cost: $ 2250length: 3 day(s)
cost: $ 1790length: 4 day(s)
cost: $ 2250length: 5 day(s)
cost: $ 1690length: 3 day(s)
cost: $ 2250length: 5 day(s)
cost: $ 2250length: 5 day(s)
cost: $ 2890length: 3 day(s)
cost: $ 1690length: 5 day(s)
cost: $ 1690length: 5 day(s)
cost: $ 1690length: 5 day(s)
cost: $ 1390length: 4 day(s)

DevOps Classes

cost: $ 1690length: 3 day(s)
cost: $ 1690length: 3 day(s)

Foundations of Web Design & Web Authoring Classes

cost: $ 1290length: 3 day(s)
cost: $ 790length: 2 day(s)
cost: $ 1190length: 3 day(s)

Java Programming Classes

cost: $ 1390length: 3 day(s)
cost: $ 1390length: 3 day(s)

Course Directory [training on all levels]

Upcoming Classes
Gain insight and ideas from students with different perspectives and experiences.

Blog Entries publications that: entertain, make you think, offer insight

One of the biggest challenges faced by senior IT professionals in organizations is the choice of the right software vendor. In the highly competitive enterprise software industry, there are lot of vendors who claim to offer the best software for the problem and it can be really daunting to narrow down the best choice. Additionally, enterprise software costs can often run into millions of dollars thereby leaving very little margin of error. The real cost of choosing a wrong software can often result into losses much more than the cost of the software itself as highlighted by software disasters experienced by leading companies like HP, Nike etc. In such a scenario, senior IT professionals despite years of expertise can find it very difficult to choose the right business software vendor for their organization.

Here are some of the proven ways of short-listing and selecting the right business software vendor for your organization,

·         Understand and Define The Exact Need First: Before embarking on a journey to select the software vendor, it is critical to understand and define the exact problem you want the software to solve. The paramount question to be asked is what business objective does the software need to solve. Is the software required to “reduce costs” or is it to “improve productivity”? Extracting and defining this fundamental question is the bare minimum but necessary step to go searching for the right vendor. It will then form the basis of comparing multiple vendors on this very need that your organization has and will help drive the selection process going forward. The detailed approach involves creating a set of parameters that the software needs to meet in order to be considered. In fact, consider categorizing these parameters further in “must-haves”, “good to have” etc. which will help you assign relevant weights to these parameter and how the software’s fare on each of these parameters

·         Building The List of Vendors Who Meet The Need: Once you have defined your need and distilled that need into various parameters, it’s time to built the list of vendors who you think will meet the need. This is akin to a lead generation model wherein you want to identify a large enough pool and then filters your list down to the best ones. There are multiple ways of building a list of vendors and more often than not, you must use a combination of these methods to build a good enough list.

o   Use Industry Reports: We discussed the IT intelligence offered by leading industry firms Gartner and Forrester in How To Keep On Top Of Latest Trends In Information Technology. These firms based on their access to leading software vendors and CIO network publish vendor comparison research reports across specific verticals as well as specific technologies. Gartner’s Magic Quadrant and Forrester’s Wave are a very good starting point to get an insight into the best software vendors. For example, if you were looking for a CRM solution, you could look for Gartner’s Magic Quadrant for CRM and look at the vendors that make the list. These reports can be pricey but well worth the money if you are going to invest hundreds of thousands in the software. Having said that, you don’t have to trust these report blindly because how these firms define the best software may not match how you define the best software for your organization

o   Competitive Intelligence: If you are a smart professional, you are already keeping tabs of your competition. Chances are that if you are a big organization, you might see a Press Release either from your competitor or their vendor announcing the implementation of new software. Extrapolate that across 5-10 key competitors of yours and you might discover the vendors that your competitors are choosing. This gives you a good indicator that the vendors used by your competitors must be offering something right.

As much as we love to assume free Wi-Fi is secure, this is far from the truth. Because you are attaching to a service many others are connected to as well, without security measures, your device can be hacked, especially if the network is unencrypted. Because this encryption involves handing out a 26-character hexadecimal key to every individual wanting to use that network, most places opt for ease of access over security. And even with a secure network, your information is vulnerable to everyone else who has the password and is on the network.

This may not seem like such a big deal and many people don’t believe they have anything to hide on their personal devices, but remember what you use on those devices. Chances are your e-mail is attached as well as all other social media sites. You may have apps that track your finances or private messages to certain others that you would never want anyone else to see. Luckily, there are steps that can be taken to reduce and prevent any unwanted information grabbers from accessing your personal information.

To start, go through your computer’s settings in order to verify your operating system’s security functions are all set to offer the highest protection. Open up the Control Panel and double check that your Firewall is enabled for both private and public networks. Then, go to Network and Sharing to open Change advanced sharing settings. In here, you can turn off file and printer sharing and network discovery for public networks.

One of the most important things to watch for is HTTPS. Hypertext Transfer Protocol Secure ensures secure communication across the web. Many of the major email systems use this when you log in (as another layer of password protection) but drop the security as soon as the login is complete. To keep this going, HTTPS Everywhere is a browser extension that gives you a secure connection when browsing some of the more popular sites. It can also be programmed for other sites you like to visit that don’t use HTTPS.

Not every place on the internet provides the choice of HTTPS, and VPNs are there to fill in the security gap. Virtual Private Networks allows data to be sent and received through public access points as if it were directly connected to a secure network. Many businesses offer this for company devices, but if you are an individual looking for that kind of security, ProXPN is a free version that can be upgraded. Unfortunately, it limits your speed, but other choices include VPNBook, OpenVPN Shield Exchange, and OkayFreedom.

With these three steps implemented, secure public Wi-Fi can be achieved. No longer will you have to worry about connecting in an unsure environment with strangers, never knowing if your information is being stolen. With all of the options free of charge, it is also an affordable means of protecting yourself that only takes a little time and effort to implement and guarantee safety.

 

In Demand IT Skills

Password Management Tools

Net Neutrality for the Layperson

What are a few unique pieces of career advice that nobody ever mentions?

Like me, I believe most people go about their business never to give a serious thought about their assumed private correspondence when using Gmail to email friends, colleagues and business associates.  As it turns out, your daily banter may not be so private after all.  A recent article in Fortune Magazine, “Judge Rejects Google Deal Over Email Scanning” caught my attention and an immediate thought dominated my curiosity…Google email and scanning scam.  

 

In essence, the article describes Googles’ agreement to change the way it scans incoming messages so that it no longer reads emails while they are in transit, but only when they are in someone's inbox! So, what exactly does that mean? Judge Koh, a San Francisco federal judge, said she's not so sure about that. Her ruling claims the settlement does not provide an adequate technical explanation of Google's workaround, which involves scanning in-transit emails for security purposes, and then later parsing them for advertising data. The judge also proposed a legal settlement to pay $2.2 million to lawyers, but nothing to consumers.

My interest in this story is not so much about the proposed settlements or the specific details about how Google or any of the web giants settle claims based on vague legal language. It is however, more about the naiveté of myself and perhaps many others that never question how the email scanning process really works. I wonder, do most of us really care that Gmail uses contents of our mail to display targeted ads?

Google is one of the most popular websites in the entire world that gets millions of views each day. Therefore, it should come as no surprise that it needs a strong and reliable programming language that it can rely on to run its searches and many of the apps that Google has created. Because of this, Google uses Python to ensure that every time a user uses one of their products, it will work smoothly and flawlessly. That being said, Google uses Python in a variety of different ways, outlined below.

Code.Google.Com
Since its creation, Google has always used Python as part of its core for programming language. This can still be seen today considering the strong relationship the two have with one another. Google supports and sponsors various Python events, and Python works to better itself so that Google remains on top of cutting edge material. One way that they do this is by working with code.google.com. This is the place where Google developers go to code, learn to code and test programs. And with it being built on Python, users can experience exactly what it is that they should expect once they start using the real site.

Google AdWords
Google AdWords is a great way for people to get their websites out there, through the use of advertising. Each time a person types in a certain string of keywords, or if they have history in their cookies, then they’ll come across these AdWords. The way that these AdWords are broadcasted to online web surfers is built on the foundation from Python. Python also helps clients access their AdWord accounts, so that they can tailor where they want their advertisements to go.

Beets
If you have loads of music, but some of it is uncategorized or sitting in a music player without a name or title, Beets is for you. This Google project uses Python and a music database to help arrange and organize music. The best part about Beets is that even if it doesn’t run exactly the way that you want, you can use a bit of Python knowledge to tailor it to be more specific to your desires.

Android-Scripting
Not only does Google run off Python, but Android also has its own value for the language. Whether you are someone who is just creating your own app for your phone or if you are someone who is looking to create the next app that gets downloaded multiple millions of times, you can use Python and Android-Scripting to create an app that does exactly what you want it to do.

YouTube
YouTube one just started as a video viewer on its own, but is now a billion-dollar company that is owned by Google. YouTube uses Python to let users view and upload video, share links, embed video and much more. Much like Google itself, YouTube relies heavily on Python to run seamlessly for the amount of traffic it gets daily.

Python is not your average coding language. Instead, it is a valuable and integral part of some of the biggest websites in the world, one of which is Google. And the resources listed here are just a fraction of what Google uses Python for in total.

 

Related:

What Are The 10 Most Famous Software Programs Written in Python?

The Future of Java and Python

Ranking Programming Languages: Which are Gaining Popularity?

Top 10 Software Skills for 2014 and Beyond

Working With Strings In Python

Working With Lists In Python

Conditional Programming In Python

Tech Life in Maryland

Maryland has several historic and renowned private colleges and universities such as St. John’s College, Washington College, Towson University, and the University of Maryland Baltimore, the most prominent of which is Johns Hopkins University. The city of Annapolis, is known as the sailing capital of the world. The Tech Council of Maryland (TCM), Maryland’s largest trade association for technology and life science companies, announced in October 2013 that Rockville, Md. based IT services firm Optimal Networks, was the winner of the organization’s first annual “Outstanding Place to Work” award, Portal Solutions, a Rockville-based technology services firm and DMI, in Bethesda, were runners up.
Object-oriented programming is an exceptionally bad idea that could only have been invented in California. Edsger Dijkstra
other Learning Options
Software developers near Bowie have ample opportunities to meet like minded techie individuals, collaborate and expend their career choices by participating in Meet-Up Groups. The following is a list of Technology Groups in the area.
Fortune 500 and 1000 companies in Maryland that offer opportunities for Linux Unix developers
Company Name City Industry Secondary Industry
McCormick and Company, Incorporated Sparks Wholesale and Distribution Grocery and Food Wholesalers
USEC Inc. Bethesda Manufacturing Manufacturing Other
Coventry Health Care, Inc. Bethesda Healthcare, Pharmaceuticals and Biotech Healthcare, Pharmaceuticals, and Biotech Other
Host Hotels and Resorts, Inc. Bethesda Travel, Recreation and Leisure Hotels, Motels and Lodging
W.R. Grace and Co. Columbia Agriculture and Mining Farming and Ranching
Discovery Communications, Inc. Silver Spring Media and Entertainment Radio and Television Broadcasting
Legg Mason, Inc. Baltimore Financial Services Financial Services Other
Marriott International Inc. Bethesda Travel, Recreation and Leisure Hotels, Motels and Lodging
Constellation Energy Resources, LLC Baltimore Energy and Utilities Gas and Electric Utilities
Lockheed Martin Corporation Bethesda Manufacturing Aerospace and Defense
T. Rowe Price Baltimore Financial Services Investment Banking and Venture Capital

training details locations, tags and why hsg

A successful career as a software developer or other IT professional requires a solid understanding of software development processes, design patterns, enterprise application architectures, web services, security, networking and much more. The progression from novice to expert can be a daunting endeavor; this is especially true when traversing the learning curve without expert guidance. A common experience is that too much time and money is wasted on a career plan or application due to misinformation.

The Hartmann Software Group understands these issues and addresses them and others during any training engagement. Although no IT educational institution can guarantee career or application development success, HSG can get you closer to your goals at a far faster rate than self paced learning and, arguably, than the competition. Here are the reasons why we are so successful at teaching:

  • Learn from the experts.
    1. We have provided software development and other IT related training to many major corporations in Maryland since 2002.
    2. Our educators have years of consulting and training experience; moreover, we require each trainer to have cross-discipline expertise i.e. be Java and .NET experts so that you get a broad understanding of how industry wide experts work and think.
  • Discover tips and tricks about Linux Unix programming
  • Get your questions answered by easy to follow, organized Linux Unix experts
  • Get up to speed with vital Linux Unix programming tools
  • Save on travel expenses by learning right from your desk or home office. Enroll in an online instructor led class. Nearly all of our classes are offered in this way.
  • Prepare to hit the ground running for a new job or a new position
  • See the big picture and have the instructor fill in the gaps
  • We teach with sophisticated learning tools and provide excellent supporting course material
  • Books and course material are provided in advance
  • Get a book of your choice from the HSG Store as a gift from us when you register for a class
  • Gain a lot of practical skills in a short amount of time
  • We teach what we know…software
  • We care…
learn more
page tags
what brought you to visit us
Bowie, Maryland Linux Unix Training , Bowie, Maryland Linux Unix Training Classes, Bowie, Maryland Linux Unix Training Courses, Bowie, Maryland Linux Unix Training Course, Bowie, Maryland Linux Unix Training Seminar
training locations
Maryland cities where we offer Linux Unix Training Classes

Interesting Reads Take a class with us and receive a book of your choosing for 50% off MSRP.