Linux Unix Training Classes in Philadelphia, Pennsylvania

Learn Linux Unix in Philadelphia, Pennsylvania and surrounding areas via our hands-on, expert led courses. All of our classes either are offered on an onsite, online or public instructor led basis. Here is a list of our current Linux Unix related training offerings in Philadelphia, Pennsylvania: Linux Unix Training

We offer private customized training for groups of 3 or more attendees.
Philadelphia  Upcoming Instructor Led Online and Public Linux Unix Training Classes
Linux Fundamentals Training/Class 23 March, 2026 - 27 March, 2026 $2200
HSG Training Center instructor led online
Philadelphia, Pennsylvania 19104
Hartmann Software Group Training Registration
Linux Troubleshooting Training/Class 2 March, 2026 - 6 March, 2026 $2290
HSG Training Center instructor led online
Philadelphia, Pennsylvania 19104
Hartmann Software Group Training Registration
OpenShift Fundamentals Training/Class 9 February, 2026 - 11 February, 2026 $2250
HSG Training Center instructor led online
Philadelphia, Pennsylvania 19104
Hartmann Software Group Training Registration
RED HAT ENTERPRISE LINUX AUTOMATION WITH ANSIBLE Training/Class 2 February, 2026 - 5 February, 2026 $2735
HSG Training Center instructor led online
Philadelphia, Pennsylvania 19104
Hartmann Software Group Training Registration
RED HAT ENTERPRISE LINUX SYSTEMS ADMIN I Training/Class 26 January, 2026 - 30 January, 2026 $2250
HSG Training Center instructor led online
Philadelphia, Pennsylvania 19104
Hartmann Software Group Training Registration
RED HAT ENTERPRISE LINUX SYSTEMS ADMIN II Training/Class 26 January, 2026 - 29 January, 2026 $1890
HSG Training Center instructor led online
Philadelphia, Pennsylvania 19104
Hartmann Software Group Training Registration
Docker Training/Class 21 January, 2026 - 23 January, 2026 $1690
HSG Training Center instructor led online
Philadelphia, Pennsylvania 19104
Hartmann Software Group Training Registration
ANSIBLE Training/Class 18 February, 2026 - 20 February, 2026 $1990
HSG Training Center instructor led online
Philadelphia, Pennsylvania 19104
Hartmann Software Group Training Registration
KUBERNETES ADMINISTRATION Training/Class 23 February, 2026 - 25 February, 2026 $2490
HSG Training Center instructor led online
Philadelphia, Pennsylvania 19104
Hartmann Software Group Training Registration

View all Scheduled Linux Unix Training Classes

Linux Unix Training Catalog

cost: $ 1390length: 4 day(s)
cost: $ 1390length: 4 day(s)
cost: $ 1990length: 3 day(s)
cost: $ 2250length: 5 day(s)
cost: $ 2800length: 4 day(s)
cost: $ 2490length: 5 day(s)
cost: $ 2250length: 5 day(s)
cost: $ 2250length: 5 day(s)
cost: $ 2290length: 4 day(s)
cost: $ 2190length: 5 day(s)
cost: $ 1690length: 4 day(s)
cost: $ 1890length: 3 day(s)
cost: $ 1890length: 4 day(s)
cost: $ 2490length: 3 day(s)
cost: $ 2680length: 4 day(s)
cost: $ 2490length: 4 day(s)
cost: $ 1290length: 3 day(s)
cost: $ 2250length: 5 day(s)
cost: $ 1090length: 3 day(s)
cost: $ 2200length: 5 day(s)
cost: $ 2250length: 5 day(s)
cost: $ 2400length: 5 day(s)
cost: $ 2250length: 5 day(s)
cost: $ 2490length: 4 day(s)
cost: $ 990length: 2 day(s)
cost: $ 2290length: 5 day(s)
cost: $ 2250length: 5 day(s)
cost: $ 1890length: 4 day(s)
cost: $ 1890length: 4 day(s)
cost: $ 1890length: 4 day(s)
cost: $ 2400length: 4 day(s)
cost: $ 2090length: 3 day(s)
cost: $ 2250length: 3 day(s)
cost: $ 1790length: 4 day(s)
cost: $ 2250length: 5 day(s)
cost: $ 1690length: 3 day(s)
cost: $ 2250length: 5 day(s)
cost: $ 2250length: 5 day(s)
cost: $ 2890length: 3 day(s)
cost: $ 1690length: 5 day(s)
cost: $ 1690length: 5 day(s)
cost: $ 1690length: 5 day(s)
cost: $ 1390length: 4 day(s)

DevOps Classes

cost: $ 1690length: 3 day(s)
cost: $ 1690length: 3 day(s)

Foundations of Web Design & Web Authoring Classes

cost: $ 1290length: 3 day(s)
cost: $ 790length: 2 day(s)
cost: $ 1190length: 3 day(s)

Java Programming Classes

cost: $ 1390length: 3 day(s)
cost: $ 1390length: 3 day(s)

Course Directory [training on all levels]

Upcoming Classes
Gain insight and ideas from students with different perspectives and experiences.

Blog Entries publications that: entertain, make you think, offer insight

It’s the eternal conundrum of a hiring manager – you have to hire for every single position in the company without any first-hand experience. How to do it? If you can have a trusted programmer sit in on the interview, that’s ideal, of course. But what if you’re hiring your first programmer? Or what if you’re hiring a freelancer? Or what if company policy dictates that you’re the only person allowed to do the interviewing? Well, in that case, you need some helpful advice and your innate bullshit detector. We questioned programmers and hiring managers and compiled a list of dos and don’ts. Here are some things to ask when interviewing programmers:

Past Experience

Ask the programmer about the biggest disaster of his career so far, and how he handled it. Did he come in at midnight to fix the code? Was he unaware of the problem until someone brought it up? Did someone else handle it?  According to our programmer sources, “Anyone worth their salt has caused a major meltdown. If they say they haven’t, they’re lying. Or very, very green.” Pushing a code with bugs in it isn’t necessarily bad. Not handling it well is bad.

As usual, your biggest asset is not knowing the field, it is knowing people. Asking about career disasters can be uncomfortable, but if the interviewee is experienced and honest then she won’t have a problem telling you about it, and you will get an idea of how she handles mishaps. Even if you don’t understand what the disaster was or how it was fixed, you should be able to tell how honest she’s being and how she handles being put on the spot.

In programming, memory leaks are a common issue, and it occurs when a computer uses memory but does not give it back to the operating system. Experienced programmers have the ability to diagnose a leak based on the symptoms. Some believe every undesired increase in memory usage is a memory leak, but this is not an accurate representation of a leak. Certain leaks only run for a short time and are virtually undetectable.

Memory Leak Consequences

Applications that suffer severe memory leaks will eventually exceed the memory resulting in a severe slowdown or a termination of the application.

How to Protect Code from Memory Leaks?

Preventing memory leaks in the first place is more convenient than trying to locate the leak later. To do this, you can use defensive programming techniques such as smart pointers for C++.  A smart pointer is safer than a raw pointer because it provides augmented behavior that raw pointers do not have. This includes garbage collection and checking for nulls.

If you are going to use a raw pointer, avoid operations that are dangerous for specific contexts. This means pointer arithmetic and pointer copying. Smart pointers use a reference count for the object being referred to. Once the reference count reaches zero, the excess goes into garbage collection. The most commonly used smart pointer is shared_ptr from the TR1 extensions of the C++ standard library.

Static Analysis

The second approach to memory leaks is referred to as static analysis and attempts to detect errors in your source-code. CodeSonar is one of the effective tools for detection. It provides checkers for the Power of Ten coding rules, and it is especially competent at procedural analysis. However, some might find it lagging for bigger code bases.

How to Handle a Memory Leak

For some memory leaks, the only solution is to read through the code to find and correct the error. Another one of the common approaches to C++ is to use RAII, which an acronym for Resource Acquisition Is Initialization. This approach means associating scoped objects using the acquired resources, which automatically releases the resources when the objects are no longer within scope. RAII has the advantage of knowing when objects exist and when they do not. This gives it a distinct advantage over garbage collection. Regardless, RAII is not always recommended because some situations require ordinary pointers to manage raw memory and increase performance. Use it with caution.

The Most Serious Leaks

Urgency of a leak depends on the situation, and where the leak has occurred in the operating system. Additionally, it becomes more urgent if the leak occurs where the memory is limited such as in embedded systems and portable devices.

To protect code from memory leaks, people have to stay vigilant and avoid codes that could result in a leak. Memory leaks continue until someone turns the system off, which makes the memory available again, but the slow process of a leak can eventually prejudice a machine that normally runs correctly.

 

Related:

The Five Principles of Performance

In Demand IT Skills

IT Outsourcing came to foray as a means for corporations to focus on critical business operations while having a specialized IT company take over the responsibility of managing the IT infrastructure and application development. For corporations especially in the developed countries, IT outsourcing provided two fold advantages, one was access to a highly talented pool of engineers and that too at a lower cost since countries like India were quickly growing their stature as an IT outsourcing hub.

IT Outsourcing is now as mainstream as ever and almost every leading organization outsources some or all parts of its IT infrastructure to a specialized company. It makes pure business sense and with tightening budget controls, IT outsourcing has become one of the strategic cost reduction driver for most organizations. Moreover, IT outsourcing is no more restricted to companies in USA & Europe outsourcing their IT projects to countries like India. Domestic companies within India itself actively use IT outsourcing including the Indian government like the India Post project given to TCS.

Is it then a no brainer that IT Outsourcing is critical to your business? Well, if it is cheaper and does not seem to have any inherent disadvantages why not!! Not really, IT Outsourcing despite proven benefits has its limitations and you should be cognizant be of the same before considering outsourcing your IT operations.

·         Limitations in estimating the actual cost of IT outsourcing:Let’s tackle the biggest driver of IT Outsourcing-Cost Savings. For anyone to estimate the cost savings from IT Outsourcing one needs to be able to predict the cost of outsourcing which then helps understand the cost savings from the same. Yes, at a higher level it is a matter of a simple $ per man-hour costs and IT outsourcing will appear to be cheaper in almost all cases. However, “hidden costs” are commonplace with IT outsourcing and it can be immensely difficult to accurately predict these hidden costs. For example, you need to be able to identify the costs of transitioning your in-house IT to an outsourcer, management overhead needed to manage the outsourcing relationship etc. In addition, IT outsourcing contracts are fixed at the start of the contract and as a result any additional requirement/change tends to be charged additionally. It is no surprise that IT requirements can change frequently and if your outsourcing contract doesn’t account for flexibility, you might be limited in the actual cost savings you might make. There is no surprise that there have been so many instances of IT outsourcing projects overshooting their budgets by a huge margin such as the one government shared services project going 500 million pounds over budget

Facebook was originally intended as a way for people to stay in touch with friends and family members by sharing pictures and status updates on their timeline. As the website's popularity has grown, so has criticism that it is becoming one giant, online high school.

Online Bullying

There has been a dramatic increase in recent years in the number of online bullying cases due to the introduction of social media. Bullying isn't just limited to younger Facebook users, either. Many adult users have also resorted to bashing others online through nasty status updates and cruel comments.

Prior to social media, bullying in high school involved "kick me" signs and toilet swirling. Facebook and other social media outlets have allowed users to take bullying to a whole other level. Victims can no longer escape bullying by leaving school or work. The torture continues online, at anytime and anyplace.

Status "Likes"

In high school, everyone wants to be part of the popular crowd; people who are outgoing, beautiful, and seem like they have everything.  Posting a status update is similar to wanting to be popular. Once an update is posted, many users wait with bated breath to see how many friends will "like" their status. They believe that the more "likes" they receive, the more popular they are.

If that isn’t enough, there are many Facebook games that involve "liking" someone's status. Games like "Truth Is", where someone likes a status update and in return the poster writes how they really feel about the friend on their Facebook wall. This can get touchy, especially if the two people aren't friends outside of Facebook. It's similar to high school where someone desperately wants another person to like them, but when they find out how that person really feels they are crushed.

Relationships Are Difficult to Keep Private

When someone signs up for Facebook they’re asked to complete their profile, which includes a relationship section. Users can select from different options including "single", "married", "widowed", and "divorced". Whenever someone changes their relationship status, the update shows up on each of their friend's news feeds.

It's easy to see how this feature correlates with high school where everyone talks about who is dating who or which couple broke up. It used to be that after graduation, people were able to keep their relationships more to themselves. Not so anymore in the age of social media. Now everyone has the ability to state their opinion on a friend's relationship status, either by "liking" their status change or by commenting on it.

Facebook has presented many benefits to its users, including the ability to rekindle old high school friendships. What one must understand when they sign up for the service is that they are opening themselves up to the same criticism and drama that takes place in a high school setting.

Proceed with caution!

Tech Life in Pennsylvania

The first daily newspaper was published in Philadelphia in 1784. In 1946 Philadelphia became home to the first computer. The State College Area High School was the first school in the country to teach drivers education in 1958. Pennsylvania has an impressive collection of schools, 500 public school districts, thousands of private schools, publicly funded colleges and universities, and over 100 private institutions of higher education. The University of Pennsylvania is also the Commonwealth's only, and geographically the most southern, Ivy League school.
It is not easy to do something good, but it is extremely difficult to do something bad. Charles Eames
other Learning Options
Software developers near Philadelphia have ample opportunities to meet like minded techie individuals, collaborate and expend their career choices by participating in Meet-Up Groups. The following is a list of Technology Groups in the area.
Fortune 500 and 1000 companies in Pennsylvania that offer opportunities for Linux Unix developers
Company Name City Industry Secondary Industry
The Hershey Company Hershey Manufacturing Food and Dairy Product Manufacturing and Packaging
Crown Holdings, Inc. Philadelphia Manufacturing Metals Manufacturing
Air Products and Chemicals, Inc. Allentown Manufacturing Chemicals and Petrochemicals
Dick's Sporting Goods Inc Coraopolis Retail Sporting Goods, Hobby, Book, and Music Stores
Mylan Inc. Canonsburg Healthcare, Pharmaceuticals and Biotech Pharmaceuticals
UGI Corporation King Of Prussia Energy and Utilities Gas and Electric Utilities
Aramark Corporation Philadelphia Business Services Business Services Other
United States Steel Corporation Pittsburgh Manufacturing Manufacturing Other
Comcast Corporation Philadelphia Telecommunications Cable Television Providers
PPL Corporation Allentown Energy and Utilities Gas and Electric Utilities
SunGard Wayne Computers and Electronics IT and Network Services and Support
WESCO Distribution, Inc. Pittsburgh Energy and Utilities Energy and Utilities Other
PPG Industries, Inc. Pittsburgh Manufacturing Chemicals and Petrochemicals
Airgas Inc Radnor Manufacturing Chemicals and Petrochemicals
Rite Aid Corporation Camp Hill Retail Grocery and Specialty Food Stores
The PNC Financial Services Group Pittsburgh Financial Services Banks
Universal Health Services, Inc. King Of Prussia Healthcare, Pharmaceuticals and Biotech Hospitals
Erie Insurance Group Erie Financial Services Insurance and Risk Management
Pierrel Research Wayne Healthcare, Pharmaceuticals and Biotech Biotechnology
Unisys Corporation Blue Bell Computers and Electronics IT and Network Services and Support
Lincoln Financial Group Radnor Financial Services Insurance and Risk Management
AmerisourceBergen Wayne Healthcare, Pharmaceuticals and Biotech Pharmaceuticals
Sunoco, Inc. Philadelphia Manufacturing Chemicals and Petrochemicals
CONSOL Energy Inc. Canonsburg Energy and Utilities Gas and Electric Utilities
H. J. Heinz Company Pittsburgh Manufacturing Food and Dairy Product Manufacturing and Packaging

training details locations, tags and why hsg

A successful career as a software developer or other IT professional requires a solid understanding of software development processes, design patterns, enterprise application architectures, web services, security, networking and much more. The progression from novice to expert can be a daunting endeavor; this is especially true when traversing the learning curve without expert guidance. A common experience is that too much time and money is wasted on a career plan or application due to misinformation.

The Hartmann Software Group understands these issues and addresses them and others during any training engagement. Although no IT educational institution can guarantee career or application development success, HSG can get you closer to your goals at a far faster rate than self paced learning and, arguably, than the competition. Here are the reasons why we are so successful at teaching:

  • Learn from the experts.
    1. We have provided software development and other IT related training to many major corporations in Pennsylvania since 2002.
    2. Our educators have years of consulting and training experience; moreover, we require each trainer to have cross-discipline expertise i.e. be Java and .NET experts so that you get a broad understanding of how industry wide experts work and think.
  • Discover tips and tricks about Linux Unix programming
  • Get your questions answered by easy to follow, organized Linux Unix experts
  • Get up to speed with vital Linux Unix programming tools
  • Save on travel expenses by learning right from your desk or home office. Enroll in an online instructor led class. Nearly all of our classes are offered in this way.
  • Prepare to hit the ground running for a new job or a new position
  • See the big picture and have the instructor fill in the gaps
  • We teach with sophisticated learning tools and provide excellent supporting course material
  • Books and course material are provided in advance
  • Get a book of your choice from the HSG Store as a gift from us when you register for a class
  • Gain a lot of practical skills in a short amount of time
  • We teach what we know…software
  • We care…
learn more
page tags
what brought you to visit us
Philadelphia, Pennsylvania Linux Unix Training , Philadelphia, Pennsylvania Linux Unix Training Classes, Philadelphia, Pennsylvania Linux Unix Training Courses, Philadelphia, Pennsylvania Linux Unix Training Course, Philadelphia, Pennsylvania Linux Unix Training Seminar
training locations
Pennsylvania cities where we offer Linux Unix Training Classes

Interesting Reads Take a class with us and receive a book of your choosing for 50% off MSRP.