# All things Operating System

# Introduction to Course 4

<div class="cds-595 css-xl5mb3 cds-596" id="bkmrk-hi%21-welcome-to-this-"><div class="cds-595 rc-Paragraph css-1lz62pp cds-597 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Hi! Welcome to this course" class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Hi! Welcome to this course </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">on computing basics for security. </span></div><div aria-label="toggle video from My name is Kim, and I work as" class="rc-Phrase css-ugczj4" data-cue="3" data-cue-index="2" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">My name is Kim, and I work as </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">a Technical Program Manager in security. </span></div><div aria-label="toggle video from I grew up with computers and the internet" class="rc-Phrase css-ugczj4" data-cue="5" data-cue-index="4" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">I grew up with computers and the internet </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">but didn't really consider security as </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">a career opportunity until I saw </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">how it was interwoven into technology. </span></div></div></div></div><div class="cds-595 css-xl5mb3 cds-596" id="bkmrk-"><div class="cds-595 rc-Paragraph css-1lz62pp cds-597 cds-grid-item">  
</div></div><div class="cds-595 css-xl5mb3 cds-596" id="bkmrk-before-my-first-secu"><div class="cds-595 rc-Paragraph css-1lz62pp cds-597 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Before my first security job," class="rc-Phrase css-ugczj4" data-cue="9" data-cue-index="8" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Before my first security job, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">I worked on a cloud application team </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">and had to regularly interact with the security team. </span></div><div aria-label="toggle video from It was my first experience working with security," class="rc-Phrase css-ugczj4" data-cue="12" data-cue-index="11" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">It was my first experience working with security, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">but the idea of protecting information and working </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">with others towards that goal was exciting to me. </span></div><div aria-label="toggle video from As a result, I decided to work towards my CISSP," class="rc-Phrase css-ugczj4" data-cue="15" data-cue-index="14" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">As a result, I decided to work towards my CISSP, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">which led me to some new job </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">opportunities at my company, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">and I was then able to move into security. </span></div></div></div></div><div class="cds-595 css-xl5mb3 cds-596" id="bkmrk--1"></div><div class="cds-595 css-xl5mb3 cds-596" id="bkmrk-at-this-point%2C-if-yo"><div class="cds-595 rc-Paragraph css-1lz62pp cds-597 cds-grid-item"><div class="phrases"><div aria-label="toggle video from At this point, if you've been following along," class="rc-Phrase css-ugczj4" data-cue="19" data-cue-index="18" role="button" tabindex="0">  
</div><div aria-label="toggle video from At this point, if you've been following along," class="rc-Phrase css-ugczj4" data-cue="19" data-cue-index="18" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">At this point, if you've been following along, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">you've already explored a variety of </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">concepts useful to the security field, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">including security domains and networking. </span></div><div aria-label="toggle video from I'm excited to join you" class="rc-Phrase css-ugczj4" data-cue="23" data-cue-index="22" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">I'm excited to join you </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">during the next part of the program. </span></div><div aria-label="toggle video from We'll take it slow so that you can" class="rc-Phrase css-ugczj4" data-cue="25" data-cue-index="24" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">We'll take it slow so that you can </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">understand these topics in practical ways. </span></div><div aria-label="toggle video from We'll take it slow so that you can" class="rc-Phrase css-ugczj4" data-cue="25" data-cue-index="24" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">The focus of this course is computing basics. </span></div><div aria-label="toggle video from When you understand how" class="rc-Phrase css-ugczj4" data-cue="28" data-cue-index="27" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">When you understand how </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">the machines in an organization's system work, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">it helps you do your job as </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">a security analyst more efficiently. </span></div></div></div></div><div class="cds-595 css-xl5mb3 cds-596" id="bkmrk--2"><div class="cds-595 rc-Paragraph css-1lz62pp cds-597 cds-grid-item">  
</div></div><div class="cds-595 css-xl5mb3 cds-596" id="bkmrk-part-of-your-job-as-"><div class="cds-595 rc-Paragraph css-1lz62pp cds-597 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Part of your job as a security analyst is to" class="rc-Phrase css-ugczj4" data-cue="32" data-cue-index="31" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Part of your job as a security analyst is to </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">keep systems protected from possible attacks. </span></div><div aria-label="toggle video from You're one of the first levels of" class="rc-Phrase css-ugczj4" data-cue="34" data-cue-index="33" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">You're one of the first levels of </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">defense in protecting an organization's data. </span></div><div aria-label="toggle video from You're one of the first levels of" class="rc-Phrase css-ugczj4" data-cue="34" data-cue-index="33" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">To do this effectively, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">it's helpful to understand how </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">the system you're protecting works. </span></div><div aria-label="toggle video from In addition, you may need to" class="rc-Phrase css-ugczj4" data-cue="39" data-cue-index="38" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">In addition, you may need to </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">investigate events to help correct errors in the system. </span></div><div aria-label="toggle video from Being familiar with Linux operating system" class="rc-Phrase css-ugczj4" data-cue="41" data-cue-index="40" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Being familiar with Linux operating system </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">and its associated commands, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">and also being able to interact with </span></div><div aria-label="toggle video from an organization's data through" class="rc-Phrase css-ugczj4" data-cue="44" data-cue-index="43" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">an organization's data through </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">SQL, will help you with that. </span></div></div></div></div><div class="cds-595 css-xl5mb3 cds-596" id="bkmrk--3"><div class="cds-595 rc-Paragraph css-1lz62pp cds-597 cds-grid-item">  
</div></div><div class="phrases" id="bkmrk-in-this-course%2C-you%27"><div aria-label="toggle video from In this course, you'll learn about" class="rc-Phrase css-ugczj4" data-cue="46" data-cue-index="45" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">In this course, you'll learn about </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">operating systems and how they </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">relate to applications and hardware. </span></div><div aria-label="toggle video from Next, you'll explore" class="rc-Phrase css-ugczj4" data-cue="49" data-cue-index="48" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Next, you'll explore </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">the Linux operating system in more detail. </span></div><div aria-label="toggle video from Then you'll use the Linux command line" class="rc-Phrase css-ugczj4" data-cue="51" data-cue-index="50" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Then you'll use the Linux command line </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">within a security context. </span></div><div aria-label="toggle video from Finally, we'll discuss how you can use SQL to query" class="rc-Phrase css-ugczj4" data-cue="53" data-cue-index="52" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Finally, we'll discuss how you can use SQL to query </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">databases while working as a security analyst. </span></div><div aria-label="toggle video from I'm excited to explore all of" class="rc-Phrase css-ugczj4" data-cue="55" data-cue-index="54" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">I'm excited to explore all of </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">these topics with you. Let's get started. </span></div></div><div aria-label="toggle video from I'm excited to explore all of" class="rc-Phrase css-ugczj4" data-cue="55" data-cue-index="54" id="bkmrk--4" role="button" tabindex="0">---

---

</div>## Course 4 content

because im legally not allowed to tell you the contents of the quizzes or its answers, the contents of the self review activities or interactive plugins. i wont be sharing that stuff but if you learn whats in this book you can probs do the quizzes pretty easly. however if you suck at writing idk maybe not so easly.

Each course of this certificate program is broken into weeks. You can complete courses at your own pace, but the weekly breakdowns are designed to help you finish the entire Google Cybersecurity Certificate in about six months.

What’s to come? Here’s a quick overview of the skills you’ll learn in each week of this course.

### **Week 1: Introduction to operating systems**

<div aria-label="toggle video from I'm excited to explore all of" class="rc-Phrase css-ugczj4" data-cue="55" data-cue-index="54" id="bkmrk--5" role="button" tabindex="0"><div><figure contenteditable="false" role="figure">![Five icons show the course followed by the four weeks sequentially from left to right with week 1 highlighted.](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/bwtSKiGTTxuSrZsTlsLYUA_923e87c785f0485288d23449e1d6bef1_Tools-R-057-1.png?expiry=1688601600000&hmac=8_I2nGMuJm8k4EfmMcP2hLJrmMN8fz37AiZex6YPlwI)</figure></div></div>You will learn about the relationship between operating systems, hardware, and software, and become familiar with the primary functions of an operating system. You'll recognize common operating systems in use today and understand how the graphical user interface (GUI) and command-line interface (CLI) both allow users to interact with the operating system.

### **Week 2: The Linux operating system**

<div aria-label="toggle video from I'm excited to explore all of" class="rc-Phrase css-ugczj4" data-cue="55" data-cue-index="54" id="bkmrk--6" role="button" tabindex="0"><div><figure contenteditable="false" role="figure">![Five icons show the course followed by the four weeks sequentially from left to right with week 2 highlighted.](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/NsymSNVTRuKAQzwY4ZWTgw_c8fe0a9aad2040c2bd0a39dbb2dfc2f1_Tools-R-057-2.png?expiry=1688601600000&hmac=A8k0ggwj4QCaY4jwvPRtN3v0M_8QxzjmcYeKLVrKbJU)</figure></div></div>You will be introduced to the Linux operating system and learn how it is commonly used in cybersecurity. You’ll also learn about Linux architecture and common Linux distributions. In addition, you'll be introduced to the Linux shell and learn how it allows you to communicate with the operating system.

### **Week 3: Linux commands in the Bash shell**

<div aria-label="toggle video from I'm excited to explore all of" class="rc-Phrase css-ugczj4" data-cue="55" data-cue-index="54" id="bkmrk--7" role="button" tabindex="0"><div><figure contenteditable="false" role="figure">![Five icons show the course followed by the four weeks sequentially from left to right with week 3 highlighted.](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/p8ItiR5rTW6X3Fp0WRH-lQ_f0348ea2bc574ea0ad3e5e4446f807f1_Tools-R-057-3.png?expiry=1688601600000&hmac=KuTaLD1pf6jtt48QvbHenSzdWtJ_WNebIgkBL9Noon4)</figure></div></div>You will be introduced to Linux commands as entered through the Bash shell. You'll use the Bash shell to navigate and manage the file system and to authorize and authenticate users. You'll also learn where to go for help when working with new Linux commands.

### **Week 4: Databases and SQL** 

<div aria-label="toggle video from I'm excited to explore all of" class="rc-Phrase css-ugczj4" data-cue="55" data-cue-index="54" id="bkmrk--9" role="button" tabindex="0"><div><figure contenteditable="false" role="figure">![Five icons show the course followed by the four weeks sequentially from left to right with week 4 highlighted.](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/mtU5Yty2Sd6jxhEQ7URXUQ_e88198b54d2a4c9793a92e7a261d59f1_Tools-R-057-4.png?expiry=1688601600000&hmac=rZzlrfOwxcdGgxroNQu0AwPC8N2cUvFR3FuCNP58EpQ)</figure></div></div>You will practice using SQL to communicate with databases. You'll learn how to query a database and filter the results. You’ll also learn how SQL can join multiple tables together in a query.

## What to expect

Each course offers many types of learning opportunities:

<div aria-label="toggle video from I'm excited to explore all of" class="rc-Phrase css-ugczj4" data-cue="55" data-cue-index="54" id="bkmrk-videos-led-by-google" role="button" tabindex="0">- **Videos** led by Google instructors teach new concepts, introduce the use of relevant tools, offer career support, and provide inspirational personal stories.
- **Readings** build on the topics discussed in the videos, introduce related concepts, share useful resources, and describe case studies.
    
    
    - the following are available exclusively on Coursera
- **Discussion prompts** explore course topics for better understanding and allow you to chat and exchange ideas with other learners in the [discussion forums<svg aria-labelledby="cds-react-aria-815-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--10" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/linux-and-sql/discussions)
- **Self-review activities** and **labs** give you hands-on practice in applying the skills you are learning and allow you to assess your own work by comparing it to a completed example.
- **Interactive plug-ins** encourage you to practice specific tasks and help you integrate knowledge you have gained in the course.
- **In-video quizzes** help you check your comprehension as you progress through each video.
- **Practice quizzes** allow you to check your understanding of key concepts and provide valuable feedback.
- **Graded quizzes** demonstrate your understanding of the main concepts of a course. You must score 80% or higher on each graded quiz to obtain a certificate, and you can take a graded quiz multiple times to achieve a passing score.

</div>because im legally not allowed to tell you the contents of the quizzes or its answers, the contents of the self review activities or interactive plugins. i wont be sharing that stuff but if you learn whats in this book you can probs do the quizzes pretty easily. however if you suck at writing idk maybe not so easily.

<div aria-label="toggle video from I'm excited to explore all of" class="rc-Phrase css-ugczj4" data-cue="55" data-cue-index="54" id="bkmrk--11" role="button" tabindex="0"></div>## Tips for success

<div aria-label="toggle video from I'm excited to explore all of" class="rc-Phrase css-ugczj4" data-cue="55" data-cue-index="54" id="bkmrk-it-is-strongly-recom" role="button" tabindex="0">- It is strongly recommended that you go through the items in each lesson in the order they appear because new information and concepts build on previous knowledge.
- Participate in all learning opportunities to gain as much knowledge and experience as possible.
- If something is confusing, don’t hesitate to replay a video, review a reading, or repeat a self-review activity.
- Use the additional resources that are referenced in this course. They are designed to support your learning. You can find all of these resources in the [Resources<svg aria-labelledby="cds-react-aria-816-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--12" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/linux-and-sql/resources/y7Px8)
- tab.
- When you encounter useful links in this course, bookmark them so you can refer to the information later for study or review.
- Understand and follow the [Coursera Code of Conduct<svg aria-labelledby="cds-react-aria-817-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--13" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.support/s/article/208280036-Coursera-Code-of-Conduct)

<span aria-hidden="true" class="cds-731 css-80vnnb cds-733">to ensure that the learning community remains a welcoming, friendly, and supportive place for all members.</span></div>

# Helpful resources and tips

As a learner, you can choose to complete one or multiple courses in this program. However, to obtain the Google Cybersecurity Certificate, you must complete all the courses. This reading describes what is required to obtain a certificate and best practices for you to have a good learning experience on Coursera.

## Course completion to obtain a certificate

To submit graded assignments and be eligible to receive a Google Cybersecurity Certificate, you must:

<div class="rc-CML" dir="auto" id="bkmrk-pay-the-course-certi"><div><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout"><div class="css-1k5v0wb" data-testid="cml-viewer">- Pay the [course certificate fee<svg aria-labelledby="cds-react-aria-835-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk-" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.support/s/article/209818963-Payments-on-Coursera?language=en_US)

</div></div></div></div></div>or apply and be approved for a Coursera [scholarship<svg aria-labelledby="cds-react-aria-836-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--1" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.support/s/article/209819033-Apply-for-Financial-Aid-or-a-Scholarship?language=en_US)

- .
- Pass all graded quizzes in the eight courses with a score of at least 80%. Each graded quiz in a course is part of a cumulative grade for that course.

## Healthy habits for course completion

Here is a list of best practices that will help you complete the courses in the program in a timely manner:

- **Plan your time:** Setting regular study times and following them each week can help you make learning a part of your routine. Use a calendar or timetable to create a schedule, and list what you plan to do each day in order to set achievable goals. Find a space that allows you to focus when you watch the videos, review the readings, and complete the activities.
- **Work at your own pace:** Everyone learns differently, so this program has been designed to let you work at your own pace. Although your personalized deadlines start when you enroll, feel free to move through the program at the speed that works best for you. There is no penalty for late assignments; to earn your certificate, all you have to do is complete all of the work. You can extend your deadlines at any time by going to **Overview** in the navigation panel and selecting **Switch Sessions**. If you have already missed previous deadlines, select **Reset my deadlines** instead.
- **Be curious:** If you find an idea that gets you excited, act on it! Ask questions, search for more details online, explore the links that interest you, and take notes on your discoveries. The steps you take to support your learning along the way will advance your knowledge, create more opportunities in this high-growth field, and help you qualify for jobs.
- **Take notes:** Notes will help you remember important information in the future, especially as you’re preparing to enter a new job field. In addition, taking notes is an effective way to make connections between topics and gain a better understanding of those topics.
- **Review exemplars:** Exemplars are completed assignments that fully meet an activity's criteria. Many activities in this program have exemplars for you to validate your work or check for errors. Although there are often many ways to complete an assignment, exemplars offer guidance and inspiration about how to complete the activity.
- **Chat (responsibly) with other learners:** If you have a question, chances are, you’re not alone. Use the [discussion forums<svg aria-labelledby="cds-react-aria-837-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--2" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/linux-and-sql/discussions)

to ask for help from other learners taking this program. You can also visit Coursera’s [Global Online Community<svg aria-labelledby="cds-react-aria-838-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--3" role="img" viewbox="0 0 16 16" width="16"></svg>](https://coursera.community/). Other important things to know while learning with others can be found in the [Coursera Honor Code<svg aria-labelledby="cds-react-aria-839-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--4" role="img" viewbox="0 0 16 16" width="16"></svg>](https://learner.coursera.help/hc/en-us/articles/209818863-Coursera-Honor-Code) and [Code of Conduct<svg aria-labelledby="cds-react-aria-840-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--5" role="img" viewbox="0 0 16 16" width="16"></svg>](https://learner.coursera.help/hc/en-us/articles/208280036-Coursera-Code-of-Conduct)

- .
- **Update your profile:** Consider [updating your profile<svg aria-labelledby="cds-react-aria-841-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--6" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/account/profile)

- on Coursera to include your photo, career goals, and more. When other learners find you in the discussion forums, they can click on your name to access your profile and get to know you better.

## Documents, spreadsheets, presentations, and labs for course activities

To complete certain activities in the program, you will need to use digital documents, spreadsheets, presentations, and/or labs. Security professionals use these software tools to collaborate within their teams and organizations. If you need more information about using a particular tool, refer to these resources:

- [Microsoft Word: Help and learning<svg aria-labelledby="cds-react-aria-842-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--7" role="img" viewbox="0 0 16 16" width="16"></svg>](https://support.microsoft.com/en-us/word)
- : Microsoft Support page for Word
- [Google Docs<svg aria-labelledby="cds-react-aria-843-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--8" role="img" viewbox="0 0 16 16" width="16"></svg>](https://support.google.com/docs/topic/9046002?hl=en&ref_topic=1382883)
- : Help Center page for Google Docs
- [Microsoft Excel: Help and learning<svg aria-labelledby="cds-react-aria-844-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--9" role="img" viewbox="0 0 16 16" width="16"></svg>](https://support.microsoft.com/en-us/excel)
- : Microsoft Support page for Excel
- [Google Sheets<svg aria-labelledby="cds-react-aria-845-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--10" role="img" viewbox="0 0 16 16" width="16"></svg>](https://support.google.com/docs/topic/9054603?hl=en&ref_topic=1382883)
- : Help Center page for Google Sheets
- [Microsoft PowerPoint: Help and learning<svg aria-labelledby="cds-react-aria-846-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--11" role="img" viewbox="0 0 16 16" width="16"></svg>](https://support.microsoft.com/en-us/powerpoint)
- : Microsoft Support page for PowerPoint
- [How to use Google Slides<svg aria-labelledby="cds-react-aria-847-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--12" role="img" viewbox="0 0 16 16" width="16"></svg>](https://support.google.com/docs/answer/2763168?hl=en&co=GENIE.Platform%3DDesktop)
- : Help Center page for Google Slides
- [Common problems with labs<svg aria-labelledby="cds-react-aria-848-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--13" role="img" viewbox="0 0 16 16" width="16"></svg>](https://support.google.com/qwiklabs/answer/9133560?hl=en&ref_topic=9134804)

- : Troubleshooting help for Qwiklabs activities

## Weekly, course, and certificate glossaries

This program covers a lot of terms and concepts, some of which you may already know and some of which may be unfamiliar to you. To review terms and help you prepare for graded quizzes, refer to the following glossaries:

- **Weekly glossaries**: At the end of each week’s content, you can review a glossary of terms from that week. Each week’s glossary builds upon the terms from the previous weeks in that course. The weekly glossaries are not downloadable; however, all of the terms and definitions are included in the course and certificate glossaries, which are downloadable.
- **Course glossaries**: At the end of each course, you can access and download a glossary that covers all of the terms in that course.
- **Certificate glossary**: The certificate glossary includes all of the terms in the entire certificate program and is a helpful resource that you can reference throughout the program or at any time in the future.

You can access and download the certificate glossaries and save them on your computer. You can always find the course and certificate glossaries through the course’s [Resources<svg aria-labelledby="cds-react-aria-849-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--14" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/linux-and-sql/resources/FUN4o)

section. To access the **Cybersecurity Certificate glossary**, click the link below and select *Use Template*.

- [Cybersecurity Certificate glossary<svg aria-labelledby="cds-react-aria-850-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--15" role="img" viewbox="0 0 16 16" width="16"></svg>](https://docs.google.com/document/d/1Feb8pHRY-blnpaLOohds2esd6IWdCIp-ikG7G_omSj4/template/preview?usp=sharing&resourcekey=0-YHcAISkCiqGDq5KwO6yNeQ)

OR

- If you don’t have a Google account, you can download the glossary directly from the attachment below.

<div id="bkmrk--17">- [click to donwload the doc](https://d3c33hcgiwev3.cloudfront.net/Q__8HGJKSWKvlbOKLdTtkg_ad50d57e3f79455783a12f606c297af1_Google-Cybersecurity-Certificate-glossary.docx?Expires=1688601600&Signature=WFHqYgcAFHo9Q7oNKvfQ4mhd3UMdBH~VvaEnwJUxXkb9Hw4dG1Mk6TSfVPryJArjtJuJou~tzWwmHchZAkJph-zhuE9XkUtcRiyjRXX90yBGs3B335JBRpDzW9wdLZPfx7KAusM6Ye55lmrgvLPO5dW3FyQdHeXlLE4RDVMGtxM_&Key-Pair-Id=APKAJLTNE6QMUY6HBC5A)

</div>## Course feedback

Providing feedback on videos, readings, and other materials is easy. With the resource open in your browser, you can find the thumbs-up and thumbs-down symbols.

- Click **thumbs-up** for materials that are helpful.
- Click **thumbs-down** for materials that are not helpful.

If you want to flag a specific issue with an item, click the flag icon, select a category, and enter an explanation in the text box. This feedback goes back to the course development team and isn’t visible to other learners. All feedback received helps to create even better certificate programs in the future.

For technical help, visit the [Learner Help Center<svg aria-labelledby="cds-react-aria-852-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--18" role="img" viewbox="0 0 16 16" width="16"></svg>](https://learner.coursera.help/hc/en-us)

.

# Welcome to week 1;  Introduction to operating systems

<div class="cds-595 css-xl5mb3 cds-596" id="bkmrk-how-many-times-a-wee"><div class="cds-595 rc-Paragraph css-1lz62pp cds-597 cds-grid-item"><div class="phrases"><div aria-label="toggle video from How many times a week do you use a computer?" class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">How many times a week do you use a computer? </span></div><div aria-label="toggle video from For some of us, the answer might be "a lot"!" class="rc-Phrase css-ugczj4" data-cue="2" data-cue-index="1" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">For some of us, the answer might be "a lot"! </span></div><div aria-label="toggle video from They are incredible machines that" class="rc-Phrase css-ugczj4" data-cue="3" data-cue-index="2" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">They are incredible machines that </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">let us do everything from using </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">specialized applications when completing a task at work </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">to sending emails to loved ones in a distant place. </span></div><div aria-label="toggle video from Have you ever thought about how computers" class="rc-Phrase css-ugczj4" data-cue="7" data-cue-index="6" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Have you ever thought about how computers </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">can do all of this? </span></div><div aria-label="toggle video from Have you ever thought about how computers" class="rc-Phrase css-ugczj4" data-cue="7" data-cue-index="6" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Well, that's where opperating systems come in.</span></div><div aria-label="toggle video from Have you ever thought about how computers" class="rc-Phrase css-ugczj4" data-cue="7" data-cue-index="6" role="button" tabindex="0"></div></div></div></div><div class="phrases" id="bkmrk-in-this-section%2C-we%27"><div aria-label="toggle video from In this section, we'll learn about" class="rc-Phrase css-ugczj4" data-cue="10" data-cue-index="9" role="button" tabindex="0"><div class="cds-595 css-xl5mb3 cds-596" id="bkmrk-"><div class="cds-595 rc-Paragraph css-1lz62pp cds-597 cds-grid-item"><div class="phrases"></div></div></div></div><div aria-label="toggle video from In this section, we'll learn about" class="rc-Phrase css-ugczj4" data-cue="10" data-cue-index="9" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">In this section, we'll learn about </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">common operating systems, and we'll explore </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">the main functions of an operating system. </span></div><div aria-label="toggle video from Then, we'll learn the relationship between" class="rc-Phrase css-ugczj4" data-cue="13" data-cue-index="12" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Then, we'll learn the relationship between </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">operating systems, applications, and hardware. </span></div><div aria-label="toggle video from Finally, we'll compare" class="rc-Phrase css-ugczj4" data-cue="15" data-cue-index="14" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Finally, we'll compare </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">graphical user interfaces and command-line interfaces. </span></div><div aria-label="toggle video from The command-line interface will be" class="rc-Phrase css-ugczj4" data-cue="17" data-cue-index="16" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">The command-line interface will be </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">an essential part of your job as a security analyst. </span></div><div aria-label="toggle video from Understanding operating systems is" class="rc-Phrase css-ugczj4" data-cue="19" data-cue-index="18" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Understanding operating systems is </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">an important foundation for your career in security. </span></div></div><div aria-label="toggle video from Understanding operating systems is" class="rc-Phrase css-ugczj4" data-cue="19" data-cue-index="18" id="bkmrk--1" role="button" tabindex="0"></div><div aria-label="toggle video from Understanding operating systems is" class="rc-Phrase css-ugczj4" data-cue="19" data-cue-index="18" id="bkmrk--2" role="button" tabindex="0"></div><div aria-label="toggle video from Understanding operating systems is" class="rc-Phrase css-ugczj4" data-cue="19" data-cue-index="18" id="bkmrk--3" role="button" tabindex="0"></div><div class="phrases" id="bkmrk-there%27s-so-much-to-e"><div aria-label="toggle video from There's so much to explore. Let's begin." class="rc-Phrase css-ugczj4" data-cue="21" data-cue-index="20" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">There's so much to explore. Let's begin. </span></div><div aria-label="toggle video from There's so much to explore. Let's begin." class="rc-Phrase css-ugczj4" data-cue="21" data-cue-index="20" role="button" tabindex="0">---

</div><div aria-label="toggle video from There's so much to explore. Let's begin." class="rc-Phrase css-ugczj4" data-cue="21" data-cue-index="20" role="button" tabindex="0"><div class="cds-595 css-xl5mb3 cds-596"><div class="cds-595 rc-Paragraph css-1lz62pp cds-597 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Devices like computers, smartphones, and tablets all have operating systems." class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Devices like computers, smartphones, and tablets all have operating systems. </span></div><div aria-label="toggle video from If you've used a desktop or laptop computer," class="rc-Phrase css-ugczj4" data-cue="2" data-cue-index="1" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">If you've used a desktop or laptop computer, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">you may have used the Windows or MacOs operating systems. Smartphones and </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">tablets run on mobile operating systems like Android and iOS. </span></div><div aria-label="toggle video from Another popular operating system is Linux." class="rc-Phrase css-ugczj4" data-cue="5" data-cue-index="4" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Another popular operating system is Linux. </span></div><div aria-label="toggle video from Linux is used in the security industry," class="rc-Phrase css-ugczj4" data-cue="6" data-cue-index="5" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Linux is used in the security industry, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">and as a security professional, it's likely that you'll interact with the Linux OS. </span></div></div></div></div><div class="cds-595 css-xl5mb3 cds-596"><div class="cds-595 rc-Paragraph css-1lz62pp cds-597 cds-grid-item">  
</div></div><div class="cds-595 css-xl5mb3 cds-596"><div class="cds-595 rc-Paragraph css-1lz62pp cds-597 cds-grid-item"><div class="phrases"><div aria-label="toggle video from So what exactly is an operating system?" class="rc-Phrase css-ugczj4" data-cue="8" data-cue-index="7" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">So what exactly is an operating system? </span></div><div aria-label="toggle video from It's the interface between the computer hardware and the user." class="rc-Phrase css-ugczj4" data-cue="9" data-cue-index="8" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">It's the interface between the computer hardware and the user. </span></div><div aria-label="toggle video from The operating system, or the OS as it's commonly called, is responsible for" class="rc-Phrase css-ugczj4" data-cue="10" data-cue-index="9" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">The operating system, or the OS as it's commonly called, is responsible for </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">making the computer run as efficiently as possible while also making it easy to use. </span></div><div aria-label="toggle video from Hardware may be another new term." class="rc-Phrase css-ugczj4" data-cue="12" data-cue-index="11" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Hardware may be another new term. </span></div><div aria-label="toggle video from Hardware refers to the physical components of a computer." class="rc-Phrase css-ugczj4" data-cue="13" data-cue-index="12" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Hardware refers to the physical components of a computer. </span></div></div></div></div><div class="cds-595 css-xl5mb3 cds-596"><div class="cds-595 rc-Paragraph css-1lz62pp cds-597 cds-grid-item">  
</div></div><div class="cds-595 css-xl5mb3 cds-596"><div class="cds-595 rc-Paragraph css-1lz62pp cds-597 cds-grid-item"><div class="phrases"><div aria-label="toggle video from The OS interface that we now rely on every day is something that early" class="rc-Phrase css-ugczj4" data-cue="14" data-cue-index="13" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">The OS interface that we now rely on every day is something that early </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">computers didn't have. </span></div><div aria-label="toggle video from In the 1950s the biggest challenge with early computers was the amount of time" class="rc-Phrase css-ugczj4" data-cue="16" data-cue-index="15" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">In the 1950s the biggest challenge with early computers was the amount of time </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">it took to run a computer program. At the time, computers could not run multiple </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">programs simultaneously. </span></div><div aria-label="toggle video from Instead, people had to wait for a program to finish running," class="rc-Phrase css-ugczj4" data-cue="19" data-cue-index="18" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Instead, people had to wait for a program to finish running, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">reset the computer, and load up the new program. </span></div><div aria-label="toggle video from Imagine having to turn your computer on and" class="rc-Phrase css-ugczj4" data-cue="21" data-cue-index="20" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Imagine having to turn your computer on and </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">off each time you had to open a new application! </span></div><div aria-label="toggle video from It would take a long time to complete a simple task like sending an email." class="rc-Phrase css-ugczj4" data-cue="23" data-cue-index="22" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">It would take a long time to complete a simple task like sending an email. </span></div><div aria-label="toggle video from Since then, operating systems have evolved, and" class="rc-Phrase css-ugczj4" data-cue="24" data-cue-index="23" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Since then, operating systems have evolved, and </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">we no longer have to worry about wasting time in this way. </span></div><div aria-label="toggle video from Thanks to operating systems and their evolution," class="rc-Phrase css-ugczj4" data-cue="26" data-cue-index="25" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Thanks to operating systems and their evolution, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">today's computers run efficiently. </span></div><div aria-label="toggle video from They run multiple applications at once, and" class="rc-Phrase css-ugczj4" data-cue="28" data-cue-index="27" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">They run multiple applications at once, and </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">they also access external devices like printers, keyboards, and mice. </span></div></div></div></div><div class="cds-595 css-xl5mb3 cds-596"><div class="cds-595 rc-Paragraph css-1lz62pp cds-597 cds-grid-item">  
</div></div><div class="cds-595 css-xl5mb3 cds-596"><div class="cds-595 rc-Paragraph css-1lz62pp cds-597 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Another reason why operating systems are important is that they help humans and" class="rc-Phrase css-ugczj4" data-cue="30" data-cue-index="29" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Another reason why operating systems are important is that they help humans and </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">computers communicate with each other. </span></div><div aria-label="toggle video from Computers communicate in a language called binary, which consists of 0s and 1s." class="rc-Phrase css-ugczj4" data-cue="32" data-cue-index="31" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Computers communicate in a language called binary, which consists of 0s and 1s. </span></div><div aria-label="toggle video from The OS provides an interface to bridge this communication gap between the user" class="rc-Phrase css-ugczj4" data-cue="33" data-cue-index="32" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">The OS provides an interface to bridge this communication gap between the user </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">and the computer, allowing you to interact with the computer in complex ways. </span></div></div></div></div><div class="cds-595 css-xl5mb3 cds-596"><div class="cds-595 rc-Paragraph css-1lz62pp cds-597 cds-grid-item">  
</div></div><div class="cds-595 css-arowdh cds-597 cds-grid-item cds-642 cds-667"><div><div class="rc-TranscriptHighlighter css-79elbk"><div class="rc-Transcript css-9li235" data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="interactive_transcript" data-track-page="item_layout" role="presentation"><div class="cds-595 css-xl5mb3 cds-596"><div class="cds-595 rc-Paragraph css-1lz62pp cds-597 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Operating systems are critical for the use of computers. Likewise," class="rc-Phrase css-ugczj4" data-cue="35" data-cue-index="34" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Operating systems are critical for the use of computers. Likewise, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">OS security is also critical for the security of a computer. </span></div><div aria-label="toggle video from This involves securing files, data access, and user authentication to" class="rc-Phrase css-ugczj4" data-cue="37" data-cue-index="36" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">This involves securing files, data access, and user authentication to </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">help protect and prevent against threats such as viruses, worms, and malware. </span></div><div aria-label="toggle video from Knowing how operating systems work is essential for" class="rc-Phrase css-ugczj4" data-cue="39" data-cue-index="38" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Knowing how operating systems work is essential for </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">completing different security related tasks. </span></div><div aria-label="toggle video from For example, as a security analyst, you may be responsible for configuring and" class="rc-Phrase css-ugczj4" data-cue="41" data-cue-index="40" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">For example, as a security analyst, you may be responsible for configuring and </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">maintaining the security of a system by managing access. </span></div><div aria-label="toggle video from You may also be responsible for managing and configuring firewalls," class="rc-Phrase css-ugczj4" data-cue="43" data-cue-index="42" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">You may also be responsible for managing and configuring firewalls, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">setting security policies, enabling virus protection, and </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">performing auditing, accounting, and logging to detect unusual behavior. </span></div><div aria-label="toggle video from All these tasks require a deep understanding of operating systems, and" class="rc-Phrase css-ugczj4" data-cue="46" data-cue-index="45" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">All these tasks require a deep understanding of operating systems, and </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">as we continue this course, we'll explore operating systems in greater detail. </span></div></div></div></div></div></div></div></div><div class="cds-595 css-hcqebr cds-597 cds-grid-item cds-642 cds-660"><div class="cds-1106 cds-formControl-root css-4p0j7c cds-1109">  
</div></div><div class="cds-1106 cds-formControl-root css-4p0j7c cds-1109"><div class="cds-1144 cds-1129 cds-input-root cds-input-onLight cds-select-field-root css-rg9d6z cds-1145"><fieldset aria-hidden="true" class="cds-1166 cds-1138 cds-input-notchedOutline" style="padding-left: 8px;"><legend class="cds-1167" style="width: 0.01px;">​</legend></fieldset></div></div>---

<div class="cds-595 css-8xlvzn cds-596"><div class="cds-595 css-0 cds-597 cds-grid-item"><div class="rc-ItemFeedback css-1f0x564"><div class="rc-ItemFeedbackContent horizontal-box css-lfchfm"><div class="css-e40v4" data-testid="like-button"><div class="rc-LikeContent"><div>  
</div></div></div></div></div></div></div><div class="css-e40v4" data-testid="dislike-button"><div class="rc-LikeContent"><div>  
</div></div></div><div class="cds-595 css-0 cds-597 cds-grid-item"><div class="rc-ItemFeedback css-1f0x564"><div class="rc-ItemFeedbackContent horizontal-box css-lfchfm"><div class="css-e40v4"><div class="rc-FlagContent css-8dn4zy" id="bkmrk--4"><div aria-live="polite" role="alert">  
</div><div class="ReactModalPortal">  
</div></div></div></div></div></div><div class="cds-595 css-0 cds-597 cds-grid-item"><div class="rc-ShareButtonWithModal" data-e2e="universal-share-cta"><div aria-label="Share this video" data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="universal_sharing_cta" data-track-page="item_layout" role="button" tabindex="0">  
</div></div></div><div class="rc-Course" role="none"><div class="rc-LegacyDataFetch"><section class="cds-595 css-kt8aw0 cds-596 cds-599"><div class="cds-595 css-0 cds-596 cds-597 cds-grid-item cds-602 cds-605"><div class="cds-595 css-1fsmhyl cds-596 cds-597 cds-grid-item cds-599 cds-602" id="bkmrk--5"><div class="cds-595 css-12jam8y cds-597 cds-grid-item cds-642"><main class="item-page-content css-b5no2e" id="bkmrk--6" style="height: 100%;"><div data-testid="faker"></div></main></div></div></div></section></div></div></div></div>

# Kim: My journey into computing

<div class="phrases" id="bkmrk-hi%2C-i%27m-kim.-i%27m-a-t"><div aria-label="toggle video from Hi, I'm Kim." class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Hi, I'm Kim. </span></div><div aria-label="toggle video from I'm a technical program manager at Google." class="rc-Phrase css-ugczj4" data-cue="2" data-cue-index="1" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">I'm a technical program manager at Google. </span></div><div aria-label="toggle video from I'm a technical program manager at Google." class="rc-Phrase css-ugczj4" data-cue="2" data-cue-index="1" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">I'm currently working in </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">the security, mergers, and acquisitions team. </span></div><div aria-label="toggle video from Where I work with other companies that we purchase," class="rc-Phrase css-ugczj4" data-cue="5" data-cue-index="4" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Where I work with other companies that we purchase, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">and I help them integrate into the Google environment. </span></div><div aria-label="toggle video from I've held multiple roles before getting into" class="rc-Phrase css-ugczj4" data-cue="7" data-cue-index="6" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">I've held multiple roles before getting into </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">cybersecurity and even technology. </span></div><div aria-label="toggle video from I first started working as a restaurant worker," class="rc-Phrase css-ugczj4" data-cue="9" data-cue-index="8" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">I first started working as a restaurant worker, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">and then I became an English Tutor </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">for international students at my local college. </span></div><div aria-label="toggle video from After doing multiple internships," class="rc-Phrase css-ugczj4" data-cue="12" data-cue-index="11" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">After doing multiple internships, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">and graduating from university, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">I had my first opportunity to work in technology, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">and that's where my interests in technology, </span></div><div aria-label="toggle video from and eventually cybersecurity began." class="rc-Phrase css-ugczj4" data-cue="16" data-cue-index="15" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">and eventually cybersecurity began. </span></div><div aria-label="toggle video from I want to tell everyone with any type of" class="rc-Phrase css-ugczj4" data-cue="17" data-cue-index="16" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">I want to tell everyone with any type of </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">background that you can get into cybersecurity. </span></div><div aria-label="toggle video from If you're interested in protecting information," class="rc-Phrase css-ugczj4" data-cue="19" data-cue-index="18" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">If you're interested in protecting information, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">if you're interested in protecting people in the future, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">security is there for you. </span></div><div aria-label="toggle video from There are so many different roles you can do," class="rc-Phrase css-ugczj4" data-cue="22" data-cue-index="21" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">There are so many different roles you can do, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">and all of the skills that you have now, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">and that you've gathered previously, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">can be applicable within security. </span></div><div aria-label="toggle video from The skill that I use the most is" class="rc-Phrase css-ugczj4" data-cue="26" data-cue-index="25" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">The skill that I use the most is </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">connecting with people every day. </span></div><div aria-label="toggle video from connecting with people every day." class="rc-Phrase css-ugczj4" data-cue="27" data-cue-index="26" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">I can't get anything done </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">unless I connect with them the right way. </span></div><div aria-label="toggle video from So that's actually the biggest skill I" class="rc-Phrase css-ugczj4" data-cue="30" data-cue-index="29" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">So that's actually the biggest skill I </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">lean on the most working in security. </span></div><div aria-label="toggle video from A piece of advice I would give" class="rc-Phrase css-ugczj4" data-cue="32" data-cue-index="31" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">A piece of advice I would give </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">for someone new starting in </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">the cybersecurity field is to keep an open mind. </span></div><div aria-label="toggle video from I started out with a degree in business," class="rc-Phrase css-ugczj4" data-cue="35" data-cue-index="34" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">I started out with a degree in business, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">so I didn't even feel like I was </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">technical enough to be where I am today. </span></div><div aria-label="toggle video from And before that, all of my experiences" class="rc-Phrase css-ugczj4" data-cue="38" data-cue-index="37" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">And before that, all of my experiences </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">were either restaurant work, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">or marketing work, or just something that </span></div><div aria-label="toggle video from felt like it was unrelated to technology." class="rc-Phrase css-ugczj4" data-cue="41" data-cue-index="40" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">felt like it was unrelated to technology. </span></div><div aria-label="toggle video from felt like it was unrelated to technology." class="rc-Phrase css-ugczj4" data-cue="41" data-cue-index="40" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">But all of that helped me and motivated me to </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">actually kind of get my feet more wet into technology, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">and then eventually security. </span></div><div aria-label="toggle video from And before I knew it," class="rc-Phrase css-ugczj4" data-cue="45" data-cue-index="44" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">And before I knew it, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">that self-doubt was really </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">replaced with more of a support </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">from my peers and </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">respect from other people that I've worked with.</span></div></div>

# Compare operating systems

You previously explored why operating systems are an important part of how a computer works. In this reading, you’ll compare some popular operating systems used today. You’ll also focus on the risks of using legacy operating systems.

## Common operating systems

The following operating systems are useful to know in the security industry: Windows, macOS®, Linux, ChromeOS, Android, and iOS.

### **Windows and macOS**

Windows and macOS are both common operating systems. The Windows operating system was introduced in 1985, and macOS was introduced in 1984. Both operating systems are used in personal and enterprise computers.

Windows is a closed-source operating system, which means the source code is not shared freely with the public. macOS is partially open source. It has some open-source components, such as macOS’s kernel. macOS also has some closed-source components.

### **Linux**

The first version of Linux was released in 1991, and other major releases followed in the early 1990s. Linux is a completely open-source operating system, which means that anyone can access Linux and its source code. The open-source nature of Linux allows developers in the Linux community to collaborate.

Linux is particularly important to the security industry. There are some distributions that are specifically designed for security. Later in this course, you’ll learn about Linux and its importance to the security industry.

### **ChromeOS**

ChromeOS launched in 2011. It’s partially open source and is derived from Chromium OS, which is completely open source. ChromeOS is frequently used in the education field.

### **Android and iOS**

Android and iOS are both mobile operating systems. Unlike the other operating systems mentioned, mobile operating systems are typically used in mobile devices, such as phones, tablets, and watches. Android was introduced for public use in 2008, and iOS was introduced in 2007. Android is open source, and iOS is partially open source.

## Operating systems and vulnerabilities

Security issues are inevitable with all operating systems. An important part of protecting an operating system is keeping the system and all of its components up to date.

### **Legacy operating systems**

A **legacy operating system** is an operating system that is outdated but still being used. Some organizations continue to use legacy operating systems because software they rely on is not compatible with newer operating systems. This can be more common in industries that use a lot of equipment that requires embedded software—software that’s placed inside components of the equipment.

Legacy operating systems can be vulnerable to security issues because they’re no longer supported or updated. This means that legacy operating systems might be vulnerable to new threats.

### **Other vulnerabilities**

Even when operating systems are kept up to date, they can still become vulnerable to attack. Below are several resources that include information on operating systems and their vulnerabilities.

<div class="rc-CML" dir="auto" id="bkmrk-microsoft-security-r"><div><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout"><div class="css-1k5v0wb" data-testid="cml-viewer">- [Microsoft Security Response Center (MSRC)<svg aria-labelledby="cds-react-aria-1059-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk-" role="img" viewbox="0 0 16 16" width="16"></svg>](https://msrc.microsoft.com/update-guide/vulnerability)

</div></div></div></div></div>- - A list of known vulnerabilities affecting Microsoft products and services
- [Apple Security Updates<svg aria-labelledby="cds-react-aria-1060-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--1" role="img" viewbox="0 0 16 16" width="16"></svg>](https://support.apple.com/en-us/HT201222)
    
    
    - A list of security updates and information for Apple® operating systems, including macOS and iOS, and other products
- [Common Vulnerabilities and Exposures (CVE) Report for Ubuntu<svg aria-labelledby="cds-react-aria-1061-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--2" role="img" viewbox="0 0 16 16" width="16"></svg>](https://ubuntu.com/security/cves)
    
    
    - A list of known vulnerabilities affecting Ubuntu, which is a specific distribution of Linux
- [Google Cloud Security Bulletin<svg aria-labelledby="cds-react-aria-1062-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--3" role="img" viewbox="0 0 16 16" width="16"></svg>](https://cloud.google.com/support/bulletins)
    
    
    - A list of known vulnerabilities affecting Google Cloud products and services

Keeping an operating system up to date is one key way to help the system stay secure. Because it can be difficult to keep all systems updated at all times, it’s important for security analysts to be knowledgeable about legacy operating systems and the risks they can create.

## Key takeaways

Windows, macOS, Linux, ChromeOS, Android, and iOS are all commonly used operating systems. Security analysts should be aware of vulnerabilities that affect operating systems. It’s especially important for security analysts to be familiar with legacy operating systems, which are systems that are outdated but still being used.

# Inside the operating system

<div class="cds-595 css-xl5mb3 cds-596" id="bkmrk-previously%2C-you-lear"><div class="cds-595 rc-Paragraph css-1lz62pp cds-597 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Previously, you learned about what operating systems are." class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Previously, you learned about what operating systems are. </span></div><div aria-label="toggle video from Now, let's discuss how they work." class="rc-Phrase css-ugczj4" data-cue="2" data-cue-index="1" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Now, let's discuss how they work. </span></div><div aria-label="toggle video from In this video, you'll learn what happens with" class="rc-Phrase css-ugczj4" data-cue="3" data-cue-index="2" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">In this video, you'll learn what happens with </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">an operating system, or OS, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">when someone uses a computer for a task. </span></div></div></div></div><div class="cds-595 css-xl5mb3 cds-596" id="bkmrk-"><div class="cds-595 rc-Paragraph css-1lz62pp cds-597 cds-grid-item">  
</div></div><div class="cds-595 css-xl5mb3 cds-596" id="bkmrk-think-about-when-som"><div class="cds-595 rc-Paragraph css-1lz62pp cds-597 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Think about when someone drives a car." class="rc-Phrase css-ugczj4" data-cue="6" data-cue-index="5" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Think about when someone drives a car. </span></div><div aria-label="toggle video from current lecture segment: They push the gas pedal and the car moves forward." class="rc-Phrase active css-ugczj4" data-cue="7" data-cue-index="6" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">They push the gas pedal and the car moves forward. </span></div><div aria-label="toggle video from They don't need to pay attention to" class="rc-Phrase css-ugczj4" data-cue="8" data-cue-index="7" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">They don't need to pay attention to </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">all the mechanics that allow the car to move. </span></div><div aria-label="toggle video from Just like a car can't work without its engine," class="rc-Phrase css-ugczj4" data-cue="10" data-cue-index="9" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Just like a car can't work without its engine, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">a computer can't work without its operating system. </span></div></div></div></div><div class="cds-595 css-xl5mb3 cds-596" id="bkmrk--1"><div class="cds-595 rc-Paragraph css-1lz62pp cds-597 cds-grid-item">  
</div></div><div class="cds-595 css-xl5mb3 cds-596" id="bkmrk-the-job-of-an-os-is-"><div class="cds-595 rc-Paragraph css-1lz62pp cds-597 cds-grid-item"><div class="phrases"><div aria-label="toggle video from The job of an OS is to help" class="rc-Phrase css-ugczj4" data-cue="12" data-cue-index="11" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">The job of an OS is to help </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">other computer programs run efficiently. </span></div><div aria-label="toggle video from The OS does this by taking care of" class="rc-Phrase css-ugczj4" data-cue="14" data-cue-index="13" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">The OS does this by taking care of </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">all the messy details related to controlling, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">the computer's hardware, so you don't have to. </span></div></div></div></div><div class="cds-595 css-xl5mb3 cds-596" id="bkmrk--2"><div class="cds-595 rc-Paragraph css-1lz62pp cds-597 cds-grid-item">  
</div></div><div class="cds-595 css-xl5mb3 cds-596" id="bkmrk-first%2C-let%27s-see-wha"><div class="cds-595 rc-Paragraph css-1lz62pp cds-597 cds-grid-item"><div class="phrases"><div aria-label="toggle video from First, let's see what" class="rc-Phrase css-ugczj4" data-cue="17" data-cue-index="16" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">First, let's see what </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">happens when you turn on the computer. </span></div><div aria-label="toggle video from When you press the power button," class="rc-Phrase css-ugczj4" data-cue="19" data-cue-index="18" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">When you press the power button, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">you're interacting with the hardware. </span></div><div aria-label="toggle video from This boosts the computer and" class="rc-Phrase css-ugczj4" data-cue="21" data-cue-index="20" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">This boosts the computer and </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">brings up the operating system. </span></div><div aria-label="toggle video from Booting the computer means that" class="rc-Phrase css-ugczj4" data-cue="23" data-cue-index="22" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Booting the computer means that </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">a special microchip called a BIOS is activated. </span></div><div aria-label="toggle video from On many computers built after 2007," class="rc-Phrase css-ugczj4" data-cue="25" data-cue-index="24" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">On many computers built after 2007, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">the chip was replaced by the UEFI. </span></div><div aria-label="toggle video from Both BIOS and UEFI contain booting instructions that are" class="rc-Phrase css-ugczj4" data-cue="27" data-cue-index="26" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Both BIOS and UEFI contain booting instructions that are </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">responsible for loading a special program </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">called the bootloader. </span></div><div aria-label="toggle video from Then, the bootloader is" class="rc-Phrase css-ugczj4" data-cue="30" data-cue-index="29" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Then, the bootloader is </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">responsible for starting the operating system. </span></div><div aria-label="toggle video from Just like that, your computer is on." class="rc-Phrase css-ugczj4" data-cue="32" data-cue-index="31" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Just like that, your computer is on. </span></div><div aria-label="toggle video from Just like that, your computer is on." class="rc-Phrase css-ugczj4" data-cue="32" data-cue-index="31" role="button" tabindex="0"></div></div></div></div><div class="cds-595 css-xl5mb3 cds-596" id="bkmrk-as-a-security-analys"><div class="cds-595 rc-Paragraph css-1lz62pp cds-597 cds-grid-item"><div class="phrases"><div aria-label="toggle video from As a security analyst," class="rc-Phrase css-ugczj4" data-cue="33" data-cue-index="32" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">As a security analyst, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">understanding these processes can be helpful for you. </span></div><div aria-label="toggle video from Vulnerabilities can occur in" class="rc-Phrase css-ugczj4" data-cue="35" data-cue-index="34" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Vulnerabilities can occur in </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">something like a booting process. </span></div><div aria-label="toggle video from Often, the BIOS is not" class="rc-Phrase css-ugczj4" data-cue="37" data-cue-index="36" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Often, the BIOS is not </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">scanned by the antivirus software, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">so it can be vulnerable to malware infection. </span></div><div aria-label="toggle video from Now, that you learned how to boot the operating system," class="rc-Phrase css-ugczj4" data-cue="40" data-cue-index="39" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Now, that you learned how to boot the operating system, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">let's look at how you and all users </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">communicate with the system to complete a task. </span></div></div></div></div><div class="cds-595 css-xl5mb3 cds-596" id="bkmrk--3"><div class="cds-595 rc-Paragraph css-1lz62pp cds-597 cds-grid-item">  
</div></div><div class="cds-595 css-xl5mb3 cds-596" id="bkmrk-the-process-starts-w"><div class="cds-595 rc-Paragraph css-1lz62pp cds-597 cds-grid-item"><div class="phrases"><div aria-label="toggle video from The process starts with you, the user." class="rc-Phrase css-ugczj4" data-cue="43" data-cue-index="42" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">The process starts with you, the user. </span></div><div aria-label="toggle video from And to complete tasks, you use applications on your computer." class="rc-Phrase css-ugczj4" data-cue="44" data-cue-index="43" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">And to complete tasks, you use applications on your computer. </span></div><div aria-label="toggle video from An application is a program" class="rc-Phrase css-ugczj4" data-cue="45" data-cue-index="44" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">An application is a program </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">that performs a specific task. </span></div><div aria-label="toggle video from When you do this, the application" class="rc-Phrase css-ugczj4" data-cue="47" data-cue-index="46" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">When you do this, the application </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">sends your request to the operating system. </span></div><div aria-label="toggle video from From there, the operating system interprets this request" class="rc-Phrase css-ugczj4" data-cue="49" data-cue-index="48" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">From there, the operating system interprets this request </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">and directs it to the appropriate component </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">of the computer's hardware. </span></div></div></div></div><div class="cds-595 css-xl5mb3 cds-596" id="bkmrk--4"><div class="cds-595 rc-Paragraph css-1lz62pp cds-597 cds-grid-item">  
</div></div><div class="cds-595 css-xl5mb3 cds-596" id="bkmrk-in-the-previous-vide"><div class="cds-595 rc-Paragraph css-1lz62pp cds-597 cds-grid-item"><div class="phrases"><div aria-label="toggle video from In the previous video," class="rc-Phrase css-ugczj4" data-cue="52" data-cue-index="51" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">In the previous video, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">we learned that the hardware consists of </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">all the physical components of the computer. </span></div><div aria-label="toggle video from The hardware will also send" class="rc-Phrase css-ugczj4" data-cue="55" data-cue-index="54" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">The hardware will also send </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">information back to the operating system. </span></div><div aria-label="toggle video from The hardware will also send" class="rc-Phrase css-ugczj4" data-cue="55" data-cue-index="54" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">And this in turn is sent back to the application. </span></div></div></div></div><div class="cds-595 css-xl5mb3 cds-596" id="bkmrk--5"><div class="cds-595 rc-Paragraph css-1lz62pp cds-597 cds-grid-item">  
</div></div><div class="cds-595 css-xl5mb3 cds-596" id="bkmrk-let%27s-give-a-simple-"><div class="cds-595 rc-Paragraph css-1lz62pp cds-597 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Let's give a simple overview of how this works" class="rc-Phrase css-ugczj4" data-cue="58" data-cue-index="57" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Let's give a simple overview of how this works </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">when you want to use the calculator on your computer. </span></div><div aria-label="toggle video from You use your mouse to click on" class="rc-Phrase css-ugczj4" data-cue="60" data-cue-index="59" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">You use your mouse to click on </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">the calculator application on your computer. </span></div><div aria-label="toggle video from When you type in the number you want to calculate," class="rc-Phrase css-ugczj4" data-cue="62" data-cue-index="61" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">When you type in the number you want to calculate, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">the application communicates with the operating system. </span></div><div aria-label="toggle video from Your operating system then sends" class="rc-Phrase css-ugczj4" data-cue="64" data-cue-index="63" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Your operating system then sends </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">a calculation to a component of the hardware, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">the central processing unit, or CPU. </span></div><div aria-label="toggle video from Once the hardware does the work" class="rc-Phrase css-ugczj4" data-cue="67" data-cue-index="66" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Once the hardware does the work </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">of determining the final number, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">it sends the answer back to your operating system. </span></div><div aria-label="toggle video from Then, it can be displayed in your calculator application." class="rc-Phrase css-ugczj4" data-cue="70" data-cue-index="69" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Then, it can be displayed in your calculator application. </span></div></div></div></div><div class="cds-595 css-xl5mb3 cds-596" id="bkmrk--6"><div class="cds-595 rc-Paragraph css-1lz62pp cds-597 cds-grid-item">  
</div></div><div class="cds-595 css-xl5mb3 cds-596" id="bkmrk-understanding-this-p"><div class="cds-595 rc-Paragraph css-1lz62pp cds-597 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Understanding this process is" class="rc-Phrase css-ugczj4" data-cue="71" data-cue-index="70" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Understanding this process is </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">helpful when investigating security events. </span></div><div aria-label="toggle video from Security analysts should be able to" class="rc-Phrase css-ugczj4" data-cue="73" data-cue-index="72" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Security analysts should be able to </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">trace back through this process flow </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">to analyze where a security event could have occurred. </span></div></div></div></div><div class="cds-595 css-xl5mb3 cds-596" id="bkmrk--7"><div class="cds-595 rc-Paragraph css-1lz62pp cds-597 cds-grid-item">  
</div></div><div class="cds-595 css-arowdh cds-597 cds-grid-item cds-642 cds-667" id="bkmrk-just-like-a-mechanic"><div><div class="rc-TranscriptHighlighter css-79elbk"><div class="rc-Transcript css-9li235" data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="interactive_transcript" data-track-page="item_layout" role="presentation"><div class="cds-595 css-xl5mb3 cds-596"><div class="cds-595 rc-Paragraph css-1lz62pp cds-597 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Just like a mechanic needs to" class="rc-Phrase css-ugczj4" data-cue="76" data-cue-index="75" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Just like a mechanic needs to </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">understand the inner workings of a car </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">more than an average driver, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">recognizing how operating systems </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">work is important knowledge for a security analyst. </span></div></div></div></div></div></div></div></div><div class="cds-595 css-hcqebr cds-597 cds-grid-item cds-642 cds-660" id="bkmrk--8"><div class="cds-1233 cds-formControl-root css-4p0j7c cds-1236"></div></div>

# Requests to the operating system

Operating systems are a critical component of a computer. They make connections between applications and hardware to allow users to perform tasks. In this reading, you’ll explore this complex process further and consider it using a new analogy and a new example.

## Booting the computer

When you boot, or turn on, your computer, either a BIOS or UEFI microchip is activated. The **Basic Input/Output System (BIOS)** is a microchip that contains loading instructions for the computer and is prevalent in older systems. The **Unified Extensible Firmware Interface (UEFI)** is a microchip that contains loading instructions for the computer and replaces BIOS on more modern systems.

The BIOS and UEFI chips both perform the same function for booting the computer. BIOS was the standard chip until 2007, when UEFI chips increased in use. Now, most new computers include a UEFI chip. UEFI provides enhanced security features.

The BIOS or UEFI microchips contain a variety of loading instructions for the computer to follow. For example, one of the loading instructions is to verify the health of the computer’s hardware.

The last instruction from the BIOS or UEFI activates the bootloader. The **bootloader** is a software program that boots the operating system. Once the operating system has finished booting, your computer is ready for use.

## Completing a task

As previously discussed, operating systems help us use computers more efficiently. Once a computer has gone through the booting process, completing a task on a computer is a four-part process.

<div class="rc-CML" dir="auto" id="bkmrk-"><div><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout"><div class="css-1k5v0wb" data-testid="cml-viewer"><div><figure contenteditable="false" role="figure">![Shows a process that moves from user to application to operating systems and finally to hardware.](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/bfvQyeg_SC-DSgUsegf8PQ_8405d4e94af147e1b98df5150c2fd7f1_CS_R-060_User-Application-Operating-System-Hardware.png?expiry=1688601600000&hmac=EV-flhwJXOjUJkSqojHptL7P7bTzrVMmWqRu1JWgR54)</figure></div></div></div></div></div></div>### User

The first part of the process is the user. The user initiates the process by having something they want to accomplish on the computer. Right now, you’re a user! You’ve initiated the process of accessing this reading.

### Application

The application is the software program that users interact with to complete a task. For example, if you want to calculate something, you would use the calculator application. If you want to write a report, you would use a word processing application. This is the second part of the process.

### Operating system

The operating system receives the user’s request from the application. It’s the operating system’s job to interpret the request and direct its flow. In order to complete the task, the operating system sends it on to applicable components of the hardware.

### Hardware

The hardware is where all the processing is done to complete the tasks initiated by the user. For example, when a user wants to calculate a number, the CPU figures out the answer. As another example, when a user wants to save a file, another component of the hardware, the hard drive, handles this task.

After the work is done by the hardware, it sends the output back through the operating system to the application so that it can display the results to the user.

## The OS at work behind the scenes

Consider once again how a computer is similar to a car. There are processes that someone won’t directly observe when operating a car, but they do feel it move forward when they press the gas pedal. It’s the same with a computer. Important work happens inside a computer that you don’t experience directly. This work involves the operating system.

You can explore this through another analogy. The process of using an operating system is also similar to ordering at a restaurant. At a restaurant you place an order and get your food, but you don’t see what’s happening in the kitchen when the cooks prepare the food.

Ordering food is similar to using an application on a computer. When you order your food, you make a specific request like “a small soup, very hot.” When you use an application, you also make specific requests like “print three double-sided copies of this document.”

You can compare the food you receive to what happens when the hardware sends output. You receive the food that you ordered. You receive the document that you wanted to print.

Finally, the kitchen is like the OS. You don’t know what happens in the kitchen, but it’s critical in interpreting the request and ensuring you receive what you ordered. Similarly, though the work of the OS is not directly transparent to you, it’s critical in completing your tasks.

## An example: Downloading a file from an internet browser

Previously, you explored how operating systems, applications, and hardware work together by examining a task involving a calculation. You can expand this understanding by exploring how the OS completes another task, downloading a file from an internet browser:

<div class="rc-CML" dir="auto" id="bkmrk-first%2C-the-user-deci"><div><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout"><div class="css-1k5v0wb" data-testid="cml-viewer">- First, the user decides they want to download a file that they found online, so they click on a download button near the file in the internet browser application.
- Then, the internet browser communicates this action to the OS.
- The OS sends the request to download the file to the appropriate hardware for processing.
- The hardware begins downloading the file, and the OS sends this information to the internet browser application. The internet browser then informs the user when the file has been downloaded.

</div></div></div></div></div>## Key takeaways

Although it operates in the background, the operating system is an essential part of the process of using a computer. The operating system connects applications and hardware to allow users to complete a task.

# Resource allocation via the OS

<div class="cds-595 css-xl5mb3 cds-596" id="bkmrk-now-we%27re-ready-to-d"><div class="cds-595 rc-Paragraph css-1lz62pp cds-597 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Now we're ready to discuss" class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Now we're ready to discuss </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">a different aspect of your operating system. </span></div><div aria-label="toggle video from Not only does the OS" class="rc-Phrase css-ugczj4" data-cue="3" data-cue-index="2" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Not only does the OS </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">interact with other parts of your computer, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">but it's also responsible for </span></div><div aria-label="toggle video from managing the resources of the system." class="rc-Phrase css-ugczj4" data-cue="6" data-cue-index="5" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">managing the resources of the system. </span></div><div aria-label="toggle video from This is a big task that requires a lot of balance to make" class="rc-Phrase css-ugczj4" data-cue="7" data-cue-index="6" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">This is a big task that requires a lot of balance to make </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">sure all the resources of </span></div><div aria-label="toggle video from the computer are used efficiently." class="rc-Phrase css-ugczj4" data-cue="9" data-cue-index="8" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">the computer are used efficiently. </span></div><div aria-label="toggle video from Think of this like the concept of energy." class="rc-Phrase css-ugczj4" data-cue="10" data-cue-index="9" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Think of this like the concept of energy. </span></div><div aria-label="toggle video from A person needs energy to complete different tasks." class="rc-Phrase css-ugczj4" data-cue="11" data-cue-index="10" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">A person needs energy to complete different tasks. </span></div><div aria-label="toggle video from current lecture segment: Some tasks need more energy," class="rc-Phrase active css-ugczj4" data-cue="12" data-cue-index="11" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Some tasks need more energy, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">while others require less. </span></div><div aria-label="toggle video from For example, going for a run" class="rc-Phrase css-ugczj4" data-cue="14" data-cue-index="13" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">For example, going for a run </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">requires more energy than watching TV. </span></div><div aria-label="toggle video from A computer's OS also needs to make sure that it" class="rc-Phrase css-ugczj4" data-cue="16" data-cue-index="15" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">A computer's OS also needs to make sure that it </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">has enough energy to </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">function correctly for certain tasks. </span></div><div aria-label="toggle video from Running an antivirus scan on your computer will use" class="rc-Phrase css-ugczj4" data-cue="19" data-cue-index="18" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Running an antivirus scan on your computer will use </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">more energy than using the calculator application. </span></div></div></div></div><div class="cds-595 css-xl5mb3 cds-596" id="bkmrk-"><div class="cds-595 rc-Paragraph css-1lz62pp cds-597 cds-grid-item">  
</div></div><div class="cds-595 css-xl5mb3 cds-596" id="bkmrk-imagine-your-compute"><div class="cds-595 rc-Paragraph css-1lz62pp cds-597 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Imagine your computer is an orchestra." class="rc-Phrase css-ugczj4" data-cue="21" data-cue-index="20" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Imagine your computer is an orchestra. </span></div><div aria-label="toggle video from Many different instruments like violins," class="rc-Phrase css-ugczj4" data-cue="22" data-cue-index="21" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Many different instruments like violins, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">drums, and trumpets are all part of the orchestra. </span></div><div aria-label="toggle video from An orchestra also has" class="rc-Phrase css-ugczj4" data-cue="24" data-cue-index="23" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">An orchestra also has </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">a conductor to direct the flow of the music. </span></div><div aria-label="toggle video from In a computer, the OS is the conductor." class="rc-Phrase css-ugczj4" data-cue="26" data-cue-index="25" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">In a computer, the OS is the conductor. </span></div><div aria-label="toggle video from In a computer, the OS is the conductor." class="rc-Phrase css-ugczj4" data-cue="26" data-cue-index="25" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">T</span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">he OS handles resource and memory management to ensure </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">the limited capacity of </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">the computer system is used where it's needed most. </span></div><div aria-label="toggle video from A variety of programs, tasks," class="rc-Phrase css-ugczj4" data-cue="30" data-cue-index="29" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">A variety of programs, tasks, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">and processes are constantly competing for </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">the resources of the central processing unit, or CPU. </span></div><div aria-label="toggle video from They all have their own reasons why they need memory," class="rc-Phrase css-ugczj4" data-cue="33" data-cue-index="32" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">They all have their own reasons why they need memory, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">storage, and input/output bandwidth. </span></div><div aria-label="toggle video from The OS is responsible for ensuring that" class="rc-Phrase css-ugczj4" data-cue="35" data-cue-index="34" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">The OS is responsible for ensuring that </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">each program is allocating and de-allocating resources. </span></div><div aria-label="toggle video from All this occurs in your computer at" class="rc-Phrase css-ugczj4" data-cue="37" data-cue-index="36" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">All this occurs in your computer at </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">the same time so that your system functions efficiently. </span></div></div></div></div><div class="cds-595 css-xl5mb3 cds-596" id="bkmrk--1"><div class="cds-595 rc-Paragraph css-1lz62pp cds-597 cds-grid-item">  
</div></div><div class="phrases" id="bkmrk-much-of-this-is-hidd"><div aria-label="toggle video from Much of this is hidden from you as a user." class="rc-Phrase css-ugczj4" data-cue="39" data-cue-index="38" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Much of this is hidden from you as a user. </span></div><div aria-label="toggle video from For example, your" class="rc-Phrase css-ugczj4" data-cue="40" data-cue-index="39" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">For example, your </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">browser's task manager will list all of </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">the tasks that are being processed, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">along with their memory and CPU usage. </span></div><div aria-label="toggle video from For example, your" class="rc-Phrase css-ugczj4" data-cue="40" data-cue-index="39" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">As an analyst, it's helpful to know </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">where a system's resources are used. </span></div><div aria-label="toggle video from Understanding usage of resources can help you respond" class="rc-Phrase css-ugczj4" data-cue="46" data-cue-index="45" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Understanding usage of resources can help you respond </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">to an incident and troubleshoot </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">applications in the system. </span></div><div aria-label="toggle video from For example, if a computer is running slowly," class="rc-Phrase css-ugczj4" data-cue="49" data-cue-index="48" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">For example, if a computer is running slowly, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">an analyst might discover </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">it's allocating resources to malware. </span></div><div aria-label="toggle video from A basic understanding of how" class="rc-Phrase css-ugczj4" data-cue="52" data-cue-index="51" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">A basic understanding of how </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">operating systems work will help you </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">better understand the security skills </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">you will learn later in this program. </span></div></div>

# Virtualization technology

You've explored a lot about operating systems. One more aspect to consider is that operating systems can run on virtual machines. In this reading, you’ll learn about virtual machines and the general concept of virtualization. You’ll explore how virtual machines work and the benefits of using them.

## What is a virtual machine?

A **virtual machine (VM)** is a virtual version of a physical computer. Virtual machines are one example of virtualization. Virtualization is the process of using software to create virtual representations of various physical machines. The term “virtual” refers to machines that don’t exist physically, but operate like they do because their software simulates physical hardware. Virtual systems don’t use dedicated physical hardware. Instead, they use software-defined versions of the physical hardware. This means that a single virtual machine has a virtual CPU, virtual storage, and other virtual hardware. Virtual systems are just code.

You can run multiple virtual machines using the physical hardware of a single computer. This involves dividing the resources of the host computer to be shared across all physical and virtual components. For example, **Random Access Memory (RAM)** is a hardware component used for short-term memory. If a computer has 16GB of RAM, it can host three virtual machines so that the physical computer and virtual machines each have 4GB of RAM. Also, each of these virtual machines would have their own operating system and function similarly to a typical computer.

## Benefits of virtual machines

Security professionals commonly use virtualization and virtual machines. Virtualization can increase security for many tasks and can also increase efficiency.

### **Security**

One benefit is that virtualization can provide an isolated environment, or a sandbox, on the physical host machine. When a computer has multiple virtual machines, these virtual machines are “guests” of the computer. Specifically, they are isolated from the host computer and other guest virtual machines. This provides a layer of security, because virtual machines can be kept separate from the other systems. For example, if an individual virtual machine becomes infected with malware, it can be dealt with more securely because it’s isolated from the other machines. A security professional could also intentionally place malware on a virtual machine to examine it in a more secure environment.

**Note:** Although using virtual machines is useful when investigating potentially infected machines or running malware in a constrained environment, there are still some risks. For example, a malicious program can escape virtualization and access the host machine. This is why you should never completely trust virtualized systems.

### **Efficiency**

Using virtual machines can also be an efficient and convenient way to perform security tasks. You can open multiple virtual machines at once and switch easily between them. This allows you to streamline security tasks, such as testing and exploring various applications.

You can compare the efficiency of a virtual machine to a city bus. A single city bus has a lot of room and is an efficient way to transport many people simultaneously. If city buses didn’t exist, then everyone on the bus would have to drive their own cars. This uses more gas, cars, and other resources than riding the city bus.

Similar to how many people can ride one bus, many virtual machines can be hosted on the same physical machine. That way, separate physical machines aren't needed to perform certain tasks.

## Managing virtual machines

Virtual machines can be managed with a software called a hypervisor. Hypervisors help users manage multiple virtual machines and connect the virtual and physical hardware. Hypervisors also help with allocating the shared resources of the physical host machine to one or more virtual machines.

One hypervisor that is useful for you to be familiar with is the Kernel-based Virtual Machine (KVM). KVM is an open-source hypervisor that is supported by most major Linux distributions. It is built into the Linux kernel, which means it can be used to create virtual machines on any machine running a Linux operating system without the need for additional software.

## Other forms of virtualization

In addition to virtual machines, there are other forms of virtualization. Some of these virtualization technologies do not use operating systems. For example, multiple virtual servers can be created from a single physical server. Virtual networks can also be created to more efficiently use the hardware of a physical network.

## Key takeaways

Virtual machines are virtual versions of physical computers and are one example of virtualization. Virtualization is a key technology in the security industry, and it’s important for security analysts to understand the basics. There are many benefits to using virtual machines, such as isolation of malware and other security risks. However, it’s important to remember there’s still a risk of malicious software escaping their virtualized environments.

# GUI versus CLI

<div class="cds-595 css-xl5mb3 cds-596" id="bkmrk-now-that-you%27ve-lear"><div class="cds-595 rc-Paragraph css-1lz62pp cds-597 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Now that you've learned the inner workings of computers," class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Now that you've learned the inner workings of computers, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">let's discuss how users and </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">operating systems communicate with each other. </span></div><div aria-label="toggle video from Now that you've learned the inner workings of computers," class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">So far, you've learned that a computer has </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">an operating system, hardware, and applications. </span></div><div aria-label="toggle video from Remember, the operating system" class="rc-Phrase css-ugczj4" data-cue="6" data-cue-index="5" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Remember, the operating system </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">communicates with the hardware to execute tasks. </span></div><div aria-label="toggle video from In this video, you'll learn how the" class="rc-Phrase css-ugczj4" data-cue="8" data-cue-index="7" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">In this video, you'll learn how the </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">user—that's you—interacts with </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">the operating system in order to </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">send tasks to the hardware. </span></div></div></div></div><div class="cds-595 css-xl5mb3 cds-596" id="bkmrk-"><div class="cds-595 rc-Paragraph css-1lz62pp cds-597 cds-grid-item">  
</div></div><div class="cds-595 css-xl5mb3 cds-596" id="bkmrk-the-user-communicate"><div class="cds-595 rc-Paragraph css-1lz62pp cds-597 cds-grid-item"><div class="phrases"><div aria-label="toggle video from The user communicates with" class="rc-Phrase css-ugczj4" data-cue="12" data-cue-index="11" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">The user communicates with </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">the operating system via an interface. </span></div><div aria-label="toggle video from A user interface is a program that allows" class="rc-Phrase css-ugczj4" data-cue="14" data-cue-index="13" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">A user interface is a program that allows </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">a user to control the functions of the operating system. </span></div><div aria-label="toggle video from Two user interfaces that we'll discuss are" class="rc-Phrase css-ugczj4" data-cue="16" data-cue-index="15" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Two user interfaces that we'll discuss are </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">the graphical user interface, or </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">GUI, and the command-line interface, or CLI. </span></div><div aria-label="toggle video from Let's cover these interfaces in more detail." class="rc-Phrase css-ugczj4" data-cue="19" data-cue-index="18" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Let's cover these interfaces in more detail. </span></div></div></div></div><div class="cds-595 css-xl5mb3 cds-596" id="bkmrk--1"><div class="cds-595 rc-Paragraph css-1lz62pp cds-597 cds-grid-item">  
</div></div><div class="cds-595 css-xl5mb3 cds-596" id="bkmrk-a-gui-is-a-user-inte"><div class="cds-595 rc-Paragraph css-1lz62pp cds-597 cds-grid-item"><div class="phrases"><div aria-label="toggle video from A GUI is a user interface that uses icons on" class="rc-Phrase css-ugczj4" data-cue="20" data-cue-index="19" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">A GUI is a user interface that uses icons on </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">the screen to manage different tasks on the computer. </span></div><div aria-label="toggle video from Most operating systems can be" class="rc-Phrase css-ugczj4" data-cue="22" data-cue-index="21" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Most operating systems can be </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">used with a graphical user interface. </span></div><div aria-label="toggle video from If you've used a personal computer or a cell phone," class="rc-Phrase css-ugczj4" data-cue="24" data-cue-index="23" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">If you've used a personal computer or a cell phone, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">you have experienced operating a GUI. </span></div><div aria-label="toggle video from Most GUIs include these components:" class="rc-Phrase css-ugczj4" data-cue="26" data-cue-index="25" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Most GUIs include these components:</span></div><div aria-label="toggle video from Most GUIs include these components:" class="rc-Phrase css-ugczj4" data-cue="26" data-cue-index="25" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733"> </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">a start menu with program groups, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">a task bar for launching programs, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">and a desktop with icons and shortcuts. </span></div><div aria-label="toggle video from All these components help you" class="rc-Phrase css-ugczj4" data-cue="30" data-cue-index="29" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">All these components help you </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">communicate with the OS to execute tasks. </span></div><div aria-label="toggle video from In addition to clicking on icons," class="rc-Phrase css-ugczj4" data-cue="32" data-cue-index="31" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">In addition to clicking on icons, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">when you use a GUI, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">you can also search for files or </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">applications from the start menu. </span></div><div aria-label="toggle video from You just have to remember the icon or name" class="rc-Phrase css-ugczj4" data-cue="36" data-cue-index="35" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">You just have to remember the icon or name </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">of the program to activate an application. </span></div></div></div></div><div class="cds-595 css-xl5mb3 cds-596" id="bkmrk--2"><div class="cds-595 rc-Paragraph css-1lz62pp cds-597 cds-grid-item">  
</div></div><div class="cds-595 css-xl5mb3 cds-596" id="bkmrk-now-let%27s-discuss-th"><div class="cds-595 rc-Paragraph css-1lz62pp cds-597 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Now let's discuss the command-line interface." class="rc-Phrase css-ugczj4" data-cue="38" data-cue-index="37" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Now let's discuss the command-line interface. </span></div><div aria-label="toggle video from In comparison, the command-line interface, or CLI," class="rc-Phrase css-ugczj4" data-cue="39" data-cue-index="38" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">In comparison, the command-line interface, or CLI, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">is a text-based user interface </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">that uses commands to interact with the computer. </span></div><div aria-label="toggle video from These commands communicate with" class="rc-Phrase css-ugczj4" data-cue="42" data-cue-index="41" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">These commands communicate with </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">the operating system and execute </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">tasks like opening programs. </span></div><div aria-label="toggle video from The command-line interface is" class="rc-Phrase css-ugczj4" data-cue="45" data-cue-index="44" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">The command-line interface is </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">a much different structure </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">than the graphical user interface. </span></div><div aria-label="toggle video from When you use the CLI," class="rc-Phrase css-ugczj4" data-cue="48" data-cue-index="47" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">When you use the CLI, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">you'll immediately notice a difference. </span></div><div aria-label="toggle video from There are no icons or graphics on the screen." class="rc-Phrase css-ugczj4" data-cue="50" data-cue-index="49" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">There are no icons or graphics on the screen. </span></div><div aria-label="toggle video from The command-line interface looks similar to" class="rc-Phrase css-ugczj4" data-cue="51" data-cue-index="50" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">The command-line interface looks similar to </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">lines of code using certain text languages. </span></div><div aria-label="toggle video from A CLI is more flexible and more powerful than a GUI." class="rc-Phrase css-ugczj4" data-cue="53" data-cue-index="52" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">A CLI is more flexible and more powerful than a GUI. </span></div><div aria-label="toggle video from Think about using a CLI" class="rc-Phrase css-ugczj4" data-cue="54" data-cue-index="53" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Think about using a CLI </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">like creating whatever meal you'd like </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">from ingredients bought at a grocery store. </span></div><div aria-label="toggle video from This gives you a lot of control and" class="rc-Phrase css-ugczj4" data-cue="57" data-cue-index="56" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">This gives you a lot of control and </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">customization about what you're going to eat. </span></div></div></div></div><div class="cds-595 css-xl5mb3 cds-596" id="bkmrk--3"><div class="cds-595 rc-Paragraph css-1lz62pp cds-597 cds-grid-item">  
</div></div><div class="cds-595 css-xl5mb3 cds-596" id="bkmrk-in-comparison%2C%C2%A0using"><div class="cds-595 rc-Paragraph css-1lz62pp cds-597 cds-grid-item"><div class="phrases"><div aria-label="toggle video from In comparison," class="rc-Phrase css-ugczj4" data-cue="59" data-cue-index="58" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">In comparison, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">using a GUI is more like ordering food from a restaurant. </span></div><div aria-label="toggle video from You can only order what's on the menu." class="rc-Phrase css-ugczj4" data-cue="61" data-cue-index="60" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">You can only order what's on the menu. </span></div><div aria-label="toggle video from If you want both a noodle dish and pizza," class="rc-Phrase css-ugczj4" data-cue="62" data-cue-index="61" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">If you want both a noodle dish and pizza, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">but the first restaurant you go to only has pizza, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">you'll have to go to another restaurant </span></div><div aria-label="toggle video from to order the noodles." class="rc-Phrase css-ugczj4" data-cue="65" data-cue-index="64" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">to order the noodles. </span></div><div aria-label="toggle video from With a graphical user interface," class="rc-Phrase css-ugczj4" data-cue="66" data-cue-index="65" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">With a graphical user interface, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">you must do one task at a time. </span></div><div aria-label="toggle video from But the command-line interface allows for customization," class="rc-Phrase css-ugczj4" data-cue="68" data-cue-index="67" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">But the command-line interface allows for customization, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">which lets you complete multiple tasks simultaneously. </span></div><div aria-label="toggle video from For example, imagine you" class="rc-Phrase css-ugczj4" data-cue="70" data-cue-index="69" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">For example, imagine you </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">have a folder with hundreds of files of </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">different file types, and you need to </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">move only the JPEG files to a new folder. </span></div><div aria-label="toggle video from Think about how slow and" class="rc-Phrase css-ugczj4" data-cue="74" data-cue-index="73" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Think about how slow and </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">tedious this would be as you use a GUI to </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">find each JPEG file in </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">this folder and move it into the new one. </span></div><div aria-label="toggle video from On the other hand, the CLI would allow you to" class="rc-Phrase css-ugczj4" data-cue="78" data-cue-index="77" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">On the other hand, the CLI would allow you to </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">streamline this process and move them all at once. </span></div></div></div></div><div class="cds-595 css-xl5mb3 cds-596" id="bkmrk--4"><div class="cds-595 rc-Paragraph css-1lz62pp cds-597 cds-grid-item">  
</div></div><div class="phrases" id="bkmrk-as-you-can-see%2C-ther"><div aria-label="toggle video from As you can see, there are" class="rc-Phrase css-ugczj4" data-cue="80" data-cue-index="79" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">As you can see, there are </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">very big differences in </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">these two types of user interfaces. </span></div><div aria-label="toggle video from As a security analyst," class="rc-Phrase css-ugczj4" data-cue="83" data-cue-index="82" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">As a security analyst, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">some of your work may involve the command-line interface. </span></div><div aria-label="toggle video from When analyzing logs or" class="rc-Phrase css-ugczj4" data-cue="85" data-cue-index="84" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">When analyzing logs or </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">authenticating and authorizing users, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">security analysts commonly use </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">a CLI in their everyday work. </span></div><div aria-label="toggle video from In this video, we discussed two types of user interfaces." class="rc-Phrase css-ugczj4" data-cue="89" data-cue-index="88" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">In this video, we discussed two types of user interfaces. </span></div><div aria-label="toggle video from In this video, we discussed two types of user interfaces." class="rc-Phrase css-ugczj4" data-cue="89" data-cue-index="88" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">You learned that you already have </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">experience using a graphical user interface, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">as most personal computers and cell phones use a GUI. </span></div><div aria-label="toggle video from You were introduced to the command-line interface." class="rc-Phrase css-ugczj4" data-cue="93" data-cue-index="92" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">You were introduced to the command-line interface. </span></div><div aria-label="toggle video from Later in the program," class="rc-Phrase css-ugczj4" data-cue="94" data-cue-index="93" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">Later in the program, </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">you'll learn how to use a CLI in Linux and how </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">relevant it is to your daily work as a security analyst. </span></div><div aria-label="toggle video from You'll get practical experience" class="rc-Phrase css-ugczj4" data-cue="97" data-cue-index="96" role="button" tabindex="0"><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">You'll get practical experience </span><span aria-hidden="true" class="cds-731 css-80vnnb cds-733">communicating through the command line. Pretty exciting, right? </span></div></div>

# The command line in use

Previously, you explored graphical user interfaces (GUI) and command-line user interfaces (CLI). In this reading, you’ll compare these two interfaces and learn more about how they’re used in cybersecurity.

## CLI vs. GUI

A **graphical user** **interface (GUI)** is a user interface that uses icons on the screen to manage different tasks on the computer. A **command-line interface (CLI)** is a text-based user interface that uses commands to interact with the computer.

### Display

One notable difference between these two interfaces is how they appear on the screen. A GUI has graphics and icons, such as the icons on your desktop or taskbar for launching programs. In contrast, a CLI only has text. It looks similar to lines of code.

<div class="rc-CML" dir="auto" id="bkmrk-"><div><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout"><div class="css-1k5v0wb" data-testid="cml-viewer"><div><figure contenteditable="false" role="figure">![Side by side comparison of a graphical user interface with icons and a command line interface with code.](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/jPiBzy6QRUC9BFKsrZSzXQ_9657c9ea0df1405aa8ba6fa1639f7bf1_Eq1sask98GT1PJWgAlVVsdoJ4BUZUA19gHHuvnwl9z5e3KfXeQ1vBp7IN8d19BsiN9mYkEWBY_x_jxXBN9NjvXa_fOEwuLWdr8JKi-Uk8ztLWl0Wm4PvLdipIryGpvtv-qMJ6WT6R2kDGXxSeF-ZJStysiZtPxlectb2JtueXryWq9cQ1Sy8YwTnUPwozg?expiry=1688601600000&hmac=BY1KrPtW-EOH6e-QIibT9C92mFBN8nbwMnZoJfzZZRM)</figure></div></div></div></div></div></div>### **Function**

These two interfaces also differ in how they function. A GUI is an interface that only allows you to make one request at a time. However, a CLI allows you to make multiple requests at a time.

## Advantages of a CLI in cybersecurity

The choice between using a GUI or CLI is partly based on personal preference, but security analysts should be able to use both interfaces. Using a CLI can provide certain advantages.

### Efficiency

Some prefer the CLI because it can be used more quickly when you know how to manage this interface. For a new user, a GUI might be more efficient because they’re easier for beginners to navigate.

Because a CLI can accept multiple requests at one time, it’s more powerful when you need to perform multiple tasks efficiently. For example, if you had to create multiple new files in your system, you could quickly perform this task in a CLI. If you were using a GUI, this could take much longer, because you have to repeat the same steps for each new file.

### History file

For security analysts, using the Linux CLI is helpful because it records a history file of all the commands and actions in the CLI. If you were using a GUI, your actions are not necessarily saved in a history file.

For example, you might be in a situation where you’re responding to an incident using a playbook. The playbook’s instructions require you to run a series of different commands. If you used a CLI, you’d be able to go back to the history and ensure all of the commands were correctly used. This could be helpful if there were issues using the playbook and you had to review the steps you performed in the command line.

Additionally, if you suspect an attacker has compromised your system, you might be able to trace their actions using the history file.

## Key takeaways

GUIs and CLIs are two types of user interfaces that security analysts should be familiar with. There are multiple differences between a GUI and a CLI, including their displays and how they function. When working in cybersecurity, a CLI is often preferred over a GUI because it can handle multiple tasks simultaneously and it includes a history file.

# Ellen: My path into cybersecurity

<div aria-label="toggle video from [MUSIC]" class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" id="bkmrk-" role="button">  
</div><div aria-label="toggle video from My name is Ellen and I am a security engineering manager at Google focused" class="rc-Phrase css-ugczj4" data-cue="2" data-cue-index="1" id="bkmrk-my-name-is-ellen-and" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">My name is Ellen and I am a security engineering manager at Google focused </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">in on how Google uses the cloud. </span></div><div aria-label="toggle video from current lecture segment: Cybersecurity wasn't a field when I got started in technology," class="rc-Phrase active css-ugczj4" data-cue="4" data-cue-index="3" id="bkmrk-cybersecurity-wasn%27t" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">Cybersecurity wasn't a field when I got started in technology, </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">something I came to later. </span></div><div aria-label="toggle video from I got started in technology when I was working retail at a poster store." class="rc-Phrase css-ugczj4" data-cue="6" data-cue-index="5" id="bkmrk-i-got-started-in-tec" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">I got started in technology when I was working retail at a poster store. </span></div><div aria-label="toggle video from And we needed to build a website and my feet hurt and I really needed to sit down." class="rc-Phrase css-ugczj4" data-cue="7" data-cue-index="6" id="bkmrk-and-we-needed-to-bui" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">And we needed to build a website and my feet hurt and I really needed to sit down. </span></div><div aria-label="toggle video from And so I asked friends to teach me how to do HTML so" class="rc-Phrase css-ugczj4" data-cue="8" data-cue-index="7" id="bkmrk-and-so-i-asked-frien" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">And so I asked friends to teach me how to do HTML so </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">I could sit down while working and I could let my blisters have a rest. </span></div><div aria-label="toggle video from While I was at the poster store, one of our customers worked at a start up and" class="rc-Phrase css-ugczj4" data-cue="10" data-cue-index="9" id="bkmrk-while-i-was-at-the-p" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">While I was at the poster store, one of our customers worked at a start up and </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">used to get employee photos framed and they asked them for </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">feedback on my website, and they ended up giving me an internship. </span></div><div aria-label="toggle video from One of the specialties that I ended up having was API design or" class="rc-Phrase css-ugczj4" data-cue="13" data-cue-index="12" id="bkmrk-one-of-the-specialti" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">One of the specialties that I ended up having was API design or </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">designing the interface by which a developer communicates with the machine. </span></div><div aria-label="toggle video from As part of that, I got into a job where I was designing a miniature version of" class="rc-Phrase css-ugczj4" data-cue="15" data-cue-index="14" id="bkmrk-as-part-of-that%2C-i-g" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">As part of that, I got into a job where I was designing a miniature version of </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">an operating system for security technology and </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">started learning security from there. </span></div><div aria-label="toggle video from Most of the people I know from cyber security, especially in the early days," class="rc-Phrase css-ugczj4" data-cue="18" data-cue-index="17" id="bkmrk-most-of-the-people-i" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">Most of the people I know from cyber security, especially in the early days, </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">do not have a degree at all. </span></div><div aria-label="toggle video from Or if they do, they have a degree like I do in something like philosophy or poetry." class="rc-Phrase css-ugczj4" data-cue="20" data-cue-index="19" id="bkmrk-or-if-they-do%2C-they-" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">Or if they do, they have a degree like I do in something like philosophy or poetry. </span></div><div aria-label="toggle video from Almost everyone learned on their own by experimenting," class="rc-Phrase css-ugczj4" data-cue="21" data-cue-index="20" id="bkmrk-almost-everyone-lear" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">Almost everyone learned on their own by experimenting, </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">by talking to people, by reading. </span></div><div aria-label="toggle video from And so I would say no technical background is required." class="rc-Phrase css-ugczj4" data-cue="23" data-cue-index="22" id="bkmrk-and-so-i-would-say-n" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">And so I would say no technical background is required. </span></div><div aria-label="toggle video from And so I would say no technical background is required." class="rc-Phrase css-ugczj4" data-cue="23" data-cue-index="22" id="bkmrk-and-in-fact%2C-having-" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">And in fact, having a background where you're used to being out in the real world </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">can sometimes make cybersecurity make more sense and </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">help you make more balanced choices. </span></div><div aria-label="toggle video from In almost all areas, there is a security community that you can find." class="rc-Phrase css-ugczj4" data-cue="27" data-cue-index="26" id="bkmrk-in-almost-all-areas%2C" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">In almost all areas, there is a security community that you can find. </span></div><div aria-label="toggle video from Figure out where they are, look for local conferences, start talking to people." class="rc-Phrase css-ugczj4" data-cue="28" data-cue-index="27" id="bkmrk-figure-out-where-the" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">Figure out where they are, look for local conferences, start talking to people. </span></div><div aria-label="toggle video from It's a lot more fun to learn that way than it is in a vacuum." class="rc-Phrase css-ugczj4" data-cue="29" data-cue-index="28" id="bkmrk-it%27s-a-lot-more-fun-" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">It's a lot more fun to learn that way than it is in a vacuum. </span></div><div aria-label="toggle video from I've found that most people if you come to them and say, hey, you're really good at" class="rc-Phrase css-ugczj4" data-cue="30" data-cue-index="29" id="bkmrk-i%27ve-found-that-most" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">I've found that most people if you come to them and say, hey, you're really good at </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">this thing, would you mind if I bought you a coffee and you showed me how to do it? </span></div><div aria-label="toggle video from That they'll always pretty much say yes." class="rc-Phrase css-ugczj4" data-cue="32" data-cue-index="31" id="bkmrk-that-they%27ll-always-" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">That they'll always pretty much say yes. </span></div><div aria-label="toggle video from The advice I give to people who don't have technical backgrounds, the first one is," class="rc-Phrase css-ugczj4" data-cue="33" data-cue-index="32" id="bkmrk-the-advice-i-give-to" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">The advice I give to people who don't have technical backgrounds, the first one is, </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">I wouldn't be afraid of the technology. </span></div><div aria-label="toggle video from It can seem like only somebody with a computer science degree could ever" class="rc-Phrase css-ugczj4" data-cue="35" data-cue-index="34" id="bkmrk-it-can-seem-like-onl" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">It can seem like only somebody with a computer science degree could ever </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">understand things, but these concepts, </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">these technologies are understandable by anyone. </span></div><div aria-label="toggle video from And so never let the fact that you might not have a technical background get" class="rc-Phrase css-ugczj4" data-cue="38" data-cue-index="37" id="bkmrk-and-so-never-let-the" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">And so never let the fact that you might not have a technical background get </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">in the way, just pick an area that interests you and start diving in. </span></div><div aria-label="toggle video from And as long as you're curious, and as long as you find it interesting, you'll," class="rc-Phrase css-ugczj4" data-cue="40" data-cue-index="39" id="bkmrk-and-as-long-as-you%27r" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">And as long as you're curious, and as long as you find it interesting, you'll, </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">you'll learn the technology. </span></div>

# Wrap-up; Glossary terms from week 1

<div class="cds-1665 css-xl5mb3 cds-1666" id="bkmrk-we-did-it%21-what-a-gr"><div class="cds-1665 rc-Paragraph css-1lz62pp cds-1667 cds-grid-item"><div class="phrases"><div aria-label="toggle video from We did it!" class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">We did it! </span></div><div aria-label="toggle video from What a great section of learning!" class="rc-Phrase css-ugczj4" data-cue="2" data-cue-index="1" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">What a great section of learning! </span></div><div aria-label="toggle video from The best thing is that we did this together and" class="rc-Phrase css-ugczj4" data-cue="3" data-cue-index="2" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">The best thing is that we did this together and </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">covered some very useful topics. </span></div><div aria-label="toggle video from Let's recap this section's lessons." class="rc-Phrase css-ugczj4" data-cue="5" data-cue-index="4" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">Let's recap this section's lessons. </span></div><div aria-label="toggle video from As a security analyst," class="rc-Phrase css-ugczj4" data-cue="6" data-cue-index="5" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">As a security analyst, </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">it's important that you understand the systems that you're working with. </span></div><div aria-label="toggle video from Understanding computer basics will help you do your job more effectively and" class="rc-Phrase css-ugczj4" data-cue="8" data-cue-index="7" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">Understanding computer basics will help you do your job more effectively and </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">efficiently. </span></div><div aria-label="toggle video from In this section, we covered common operating systems." class="rc-Phrase css-ugczj4" data-cue="10" data-cue-index="9" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">In this section, we covered common operating systems. </span></div><div aria-label="toggle video from In this section, we covered common operating systems." class="rc-Phrase css-ugczj4" data-cue="10" data-cue-index="9" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">We also discussed the main functions of an operating system. </span></div><div aria-label="toggle video from Importantly, you learned about the relationship between operating systems," class="rc-Phrase css-ugczj4" data-cue="12" data-cue-index="11" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">Importantly, you learned about the relationship between operating systems, </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">applications, and hardware. </span></div><div aria-label="toggle video from It was nice to learn how they flow together like an orchestra." class="rc-Phrase css-ugczj4" data-cue="14" data-cue-index="13" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">It was nice to learn how they flow together like an orchestra. </span></div><div aria-label="toggle video from In addition, you learned about the differences between the graphical user" class="rc-Phrase css-ugczj4" data-cue="15" data-cue-index="14" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">In addition, you learned about the differences between the graphical user </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">interface and the command-line interface. </span></div><div aria-label="toggle video from Understanding the command-line interface will be very important for your work." class="rc-Phrase css-ugczj4" data-cue="17" data-cue-index="16" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">Understanding the command-line interface will be very important for your work. </span></div></div></div></div><div class="cds-1665 css-xl5mb3 cds-1666" id="bkmrk-"><div class="cds-1665 rc-Paragraph css-1lz62pp cds-1667 cds-grid-item">  
</div></div><div class="phrases" id="bkmrk-i-enjoyed-exploring-"><div aria-label="toggle video from I enjoyed exploring the world of operating systems with you." class="rc-Phrase css-ugczj4" data-cue="18" data-cue-index="17" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">I enjoyed exploring the world of operating systems with you. </span></div><div aria-label="toggle video from Knowing how operating systems work is an important step in preparing for" class="rc-Phrase css-ugczj4" data-cue="19" data-cue-index="18" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">Knowing how operating systems work is an important step in preparing for </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">a position as a security analyst. </span></div><div aria-label="toggle video from You're doing great!" class="rc-Phrase css-ugczj4" data-cue="21" data-cue-index="20" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">You're doing great! </span></div><div aria-label="toggle video from Let's keep moving forward with this program." class="rc-Phrase css-ugczj4" data-cue="22" data-cue-index="21" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">Let's keep moving forward with this program. </span></div><div aria-label="toggle video from In the next section," class="rc-Phrase css-ugczj4" data-cue="23" data-cue-index="22" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">In the next section, </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">we'll focus specifically on the Linux operating system. </span></div></div><div aria-label="toggle video from In the next section," class="rc-Phrase css-ugczj4" data-cue="23" data-cue-index="22" id="bkmrk--1" role="button" tabindex="0">---

</div>## **Terms and definitions from Course 4, Week 1**

**Application:** A program that performs a specific task

**Basic Input/Output System (BIOS):** A microchip that contains loading instructions for the computer and is prevalent in older systems

**Bootloader:** A software program that boots the operating system

**Command-line interface (CLI):** A text-based user interface that uses commands to interact with the computer

**Graphical user interface (GUI):** A user interface that uses icons on the screen to manage different tasks on the computer

**Hardware:** The physical components of a computer

**Legacy operating system:** An operating system that is outdated but still being used

**Operating system (OS)**: The interface between computer hardware and the user

**Random Access Memory (RAM):** A hardware component used for short-term memory

**Unified Extensible Firmware Interface (UEFI):** A microchip that contains loading instructions for the computer and replaces BIOS on more modern systems

**User interface:** A program that allows the user to control the functions of the operating system

**Virtual machine (VM)**: A virtual version of a physical computer